0% found this document useful (0 votes)
15 views41 pages

Practice Test 1 Questions

The document consists of a series of multiple-choice questions related to computer science concepts, covering topics such as processors, input devices, databases, networking, programming, and software. Each question presents a scenario or definition, asking the reader to select the correct answer from provided options. The questions are designed to assess knowledge in various areas of computing and information technology.
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
15 views41 pages

Practice Test 1 Questions

The document consists of a series of multiple-choice questions related to computer science concepts, covering topics such as processors, input devices, databases, networking, programming, and software. Each question presents a scenario or definition, asking the reader to select the correct answer from provided options. The questions are designed to assess knowledge in various areas of computing and information technology.
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 41

n1 1

Which of the following is a term that some computer and chip


manufacturers use to refer to a personal computer processor
chip that interprets and carries out the basic instructions that
operate a computer?
a) Microprocessor

b) Parallel processor

c) Co-processor

d) Ultraprocessor

e) Perpendicular processor

n2 0
Which of the following is NOT considered an input device?
a) Keyboard

b) Mouse

c) Scanner

d) Monitor

e) Microphone

n3 1
Within database programs, fields are generally grouped
together to form which of the following?
a) Records

b) Files

c) Fragments

d) Hierarchies

e) Valleys

n4 0
A monitor that displays a higher resolution will use
a) a smaller number of pixels, and thus provide a smoother image

b) a smaller number of pixels, and thus provide a rougher image

c) a greater number of pixels, and thus provide a smoother image

d) a greater number of pixels, and thus provide a rougher image

e) something other than pixels, because they do not affect resolution

n5 1
Fiber optic lines that use digital signals and telephone lines
that sometimes use analog signals are known as
a) communications channels

b) communications hardware

c) sending devices

d) receiving devices

e) communications software
n6 0
A file that is accessed in a serial manner from its beginning to
its end is known as a
a) hash file

b) sequential file

c) indexed file

d) sentinel

e) binary file

n7 0
Which of the following is (are) considered advantages of fiber-
optic cables over cables that use wire?

I. Easier installation and lower costs


II. Less susceptibility to noise from other devices
III. Faster data transmission and smaller size

a) I only

b) III only

c) I and II only

d) II and III only

e) I, II, and III

n8 0
In a communications system, data and information travel over
a communications channel. For best performance, a
communications channel's
a) bandwidth and latency should be low
b) bandwidth should be low and latency high

c) bandwidth and latency should be the high

d) bandwidth should be high and latency low

e) bandwidth and latency should be the same

n9 1
In a relational database, which of the following fields would
most likely be used to define the relationship between a table
containing customer contact information and a table
containing customer purchases?
a) Customer identification number

b) Purchase item number

c) Purchase date

d) Customer street address

e) Customer date of birth

n 10 0
A bit (binary digit) is the smallest unit of data a computer can
process. When 8 bits are grouped together as a unit, they
form which of the following, which can represent 256
individual characters?
a) Chip

b) Byte

c) Code
d) Field

e) Record

n 11 0
Which of the following is a coding scheme implemented in
several operating systems and can represent almost all of the
world's current written languages as well as classic and
historical languages?
a) Morse code

b) American Standard Code for Information Interchange (ASCII)

c) Unicode

d) Extended Binary Coded Decimal Interchange Code (EBCDIC)

e) Multicode

n 12 0
Graphics and audio files exist in a variety of formats. Which of
the following formats compresses digital audio signals to
reduce the amount of data required to represent it?
a) MP3

b) GIF

c) BMP

d) PNG

e) TIFF
n 13 0
A network that extends or “tunnels” through a public network
to create a secure sharing of data between two private
networks as if they were directly connected is known as a
a) Local Area Network (LAN)

b) Metropolitan Area Network (MAN)

c) Wide Area Network (WAN)

d) Virtual Private Network (VPN)

e) District Area Network (DAN)

n 14 0
The design of computers, devices, and media in a network is
known as which of the following?
a) Network coverage

b) Network architecture

c) Network technology

d) Network protocol

e) Network channel

n 15 0
Which of the following terms is commonly used to refer to a
collection of related data or files pertaining to a particular
subject?
a) Network

b) Field
c) Record

d) SQL database

e) Workbook

n 16 0
On a star network, all computers and devices (nodes) attach
to a central device that provides a common connection point
known as a
a) hub

b) bus

c) printer

d) modem

e) ring

n 17 0
On a network, the major difference between the server and
client computers is that the server ordinarily has
a) less power, less storage space, and is less reliable

b) less power, less storage space, but is more reliable

c) more power, less storage space, and is less reliable

d) more power, more storage space, but is less reliable

e) more power, more storage space, and is more reliable

n 18 0
In a client/server network, a network server is a dedicated
server that
a) stores and manages files

b) manages printers and print jobs

c) stores and provides access to a database

d) manages network traffic (activity)

e) relies on the clients for its resources

n 19 0
Which of the following is a unique value that allows a
database to access information regarding an individual
record?
a) Match

b) Storage property

c) Tree

d) Index

e) Identity map

n 20 0
On a peer-to-peer network, each computer
a) has equal responsibilities and capabilities

b) stores files on separate storage devices

c) utilizes a single computer that holds the operating system and application software necessary to handle netw

d) accesses a central point on the network for data


e) is authenticated by one device

n 21 0
The operating system on a computer sometimes is called the
platform. A cross-platform application program is one that
a) includes an operating system

b) runs only on one operating system

c) runs differently on every operating system

d) runs the same on multiple operating systems

e) runs differently on one operating system

n 22 0
Which of the following features of a word processing program
automatically handles the end of a typed line for the user,
eliminating the need to press Enter or Return when the end of
the line is reached?
a) Font

b) Margins

c) Cursor

d) Word-wrap

e) Page Down

n 23 0
Word processed texts that are aligned at both the left and
right margins are referred to as
a) centered

b) ragged right

c) justified

d) right-aligned

e) left-aligned

n 24 0
Which of the following steps of the programming development
cycle consists of three major tasks: (1) review the
requirements, (2) meet with the systems analysts and users,
and (3) identify input, output, processing, and data
components?
a) Analysis

b) Design

c) Test

d) Implementation

e) Maintenance

n 25 0
Structured design breaks down a program's original set of
requirements into smaller, more manageable sections. In
structured design, a section of a program that performs a
single function is known as a
a) main routine

b) bug
c) macro generator

d) module

e) style sheet

n 26 0
Which of the following is a design tool that programmers use
to help document a solution algorithm and graphically show a
program's logic?
a) Hierarchy chart

b) Pseudocode

c) Flowchart

d) Assembler

e) Class diagram

n 27 0
Which of the following is language instructions that uses a
series of binary digits (1s and 0s) or a combination of numbers
and letters that represent binary digits?
a) Machine

b) Assembly

c) Object-oriented

d) Procedural

e) Nonprocedural

n 28 0
Programmers typically use either a compiler or interpreter to
translate a program into machine language instructions that a
computer can execute. Which of the following is considered an
advantage of an interpreter?
a) When an interpreter finds errors, it displays feedback immediately.

b) Interpreted programs run faster than compiled programs.

c) An interpreter translates an entire program before execution.

d) An interpreter produces an object program.

e) An interpreter only needs to analyze each statement a single time.

n 29 0
Which of the following are complete object-oriented
programming (OOP) languages that programmers can use to
implement an object-oriented design?
a) BASIC and C

b) Python and Rust

c) Node.js and C

d) C++ and Java

e) HTML and Logo

n 30 0
To configure devices and troubleshoot network connections,
network administrators and other advanced users work with
which of the following interfaces in which they type
commands or press special keys on the keyboard (such as
function keys or key combinations) to enter data and
instructions?
a) Command-line interface

b) Menu-driven interface

c) Performance-monitor interface

d) Graphical user interface (GUI)

e) Multimedia interface

n 31 0
Which interface allows users to interact with menus and visual
images, such as icons, buttons, and other objects, to issue
commands?
a) Command-line interface

b) Menu-driven interface

c) Performance-monitor interface

d) Graphical user interface (GUI)

e) Multimedia interface

n 32 0
In a graphical user interface (GUI), a small image displayed on
the computer screen that represents a program, an
instruction, or some other object is known as a
a) menu

b) command

c) window

d) utility
e) icon

n 33 0
Sometimes a company cannot find software that meets its
unique requirements. In this case, the company may need
which of the following software to perform functions specific to
its business or industry?
a) Packaged software

b) Freeware

c) Custom software

d) Shareware

e) Public-domain software

n 34 0
Which of the following is copyrighted software that is
distributed free for a trial period, after which a payment
should be sent to the person or company who developed the
program?
a) Shareware

b) Custom software

c) Packaged software

d) Public-domain software

e) Freeware

n 35 0
Which of the following are basic categories of operating
systems that exist today?
a) MacOS X 10.12, MacOS X 10.13, and MacOS X 10.14

b) Standalone, network, and embedded

c) Windows 7, Windows 8, and Windows 10

d) Command line, utility, and proprietary

e) Stand-apart, netbook, and interwoven

n 36 0
Data integrity identifies the quality of data. Which of the
following is a computer phrase that means users cannot
create correct information from data that is incorrect?
a) Nothing ventured, nothing gained (NVNG)

b) What you see is what you get (WYSIWYG)

c) Garbage in, garbage out (GIGO)

d) Bad data, bad information (BDBI)

e) What goes up, must come down (WGUMCD)

n 37 0
A database uses a variety of characteristics to define each
field. An important consideration is the data type, which
a) uniquely identifies each field

b) refers to the key of other tables

c) uniquely identifies each record


d) specifies the kind of data a field can contain and how the data is used

e) identifies the row and column of a sheet

n 38 0
The lowest monthly fee at a fitness center is $20.25 and the
highest is $55.50. What type of check on the data file's
Monthly Fee field will ensure the monthly fee is a value
between $20.25 and $55.50?
a) Range check

b) Completeness check

c) Consistency check

d) Alphabetic check

e) Numeric check

n 39 0
Which of the following ensures that information being
transmitted over the internet is routed to its proper
destination?
a) Spoof

b) TCP/IP

c) Point of Presence

d) 802.11b

e) WLAN

n 40 0
More complex data management systems maintain a log,
which is a listing of activities that change the database. In the
log, a Database Management System (DBMS) will NOT
a) keep a copy of a record prior to a change

b) keep the actual change to a record

c) keep a copy of a record after a change

d) state who made a change, when it was made, and from which computer it was made

e) place files in different sites on the same network or separate networks

n 41 0
An object-oriented database (OODB) stores data in objects,
which contain data as well as the actions that read or process
the data. Compared with relational databases, object-oriented
databases do NOT
a) store more types of data

b) access data faster

c) allow programmers to reuse objects

d) customize data models

e) use a standard query language

n 42 0
An example of an application appropriate for an object-
oriented database is a hypertext database, which
a) stores data about engineering and scientific designs

b) contains text links to other types of documents


c) stores documents such as schedules, calendars, and reports

d) contains text, graphics, video, and sound

e) stores related types of data

n 43 0
Which of the following is the major database type that totes
the ability to easily search unrelated data housed within it?
a) A NoSQL database

b) A relational database

c) A hierarchical database

d) A network database

e) An object-oriented database

n 44 0
Which of the following is the process of converting paper
documents into electronic form and storing the converted
document graphically in a database on a computer?
a) Editing

b) Formatting

c) Imaging

d) Charting

e) Authoring

n 45 0
Document imaging reduces the costs associated with storing
paper-based documents. Other advantages of document
imaging include all of the following EXCEPT
a) document images are centrally available

b) the need for file cabinets is eliminated

c) document images can be found quickly and easily

d) file sizes are small when compared to word processing documents

e) record management is more efficient and workflow increases

n 46 0
A systems analyst is responsible for designing and developing
an information system. During the system development cycle,
the systems analyst is the liaison between the
a) project team and the project leader

b) project leader and the users

c) users and the IT professionals

d) project team and the steering committee

e) users and the steering committee

n 47 0
Which of the following stages of the software life cycle focuses
on how a software program will accomplish its goals?
a) Documentation

b) Testing

c) Design
d) Maintenance

e) Development

n 48 0
How can a sender ensure confidentiality when replying to one
person within a group email?
a) Reply to all.

b) Reply only to the user.

c) Reply to the user only but carbon copy (cc) all others.

d) Reply to the user only and blind carbon copy (bcc) all the others.

e) Not give a response because only group communications should be done.

n 49 0
Which of the following is a protocol that allows a user to
establish a remote connection with a computer that is linked
to the internet?
a) Port

b) Ping

c) Telnet

d) VT100

e) HTTP

n 50 0
Which of these records characters typed by a computer user
and enables strangers to learn passwords?
a) Keylogger

b) Browser hijacker

c) Pop-up generator

d) Search hijacker

e) Password generator

n 51 0
Transaction processing systems can use either batch
processing or real-time (online transaction) processing. In
class registration at a local college, batch process would be
best used for
a) entering a desired schedule

b) printing a statement of classes

c) determining course availability

d) checking for course prerequisites

e) printing and mailing all student invoices

n 52 0
Management information systems, which generate accurate,
organized, and timely information for managers, evolved from
a) office information systems

b) decision support systems

c) transaction processing systems


d) executive information systems

e) expert systems

n 53 0
A management information system (MIS) can create several
types of reports. Which of the following reports identifies data
outside of a normal condition?
a) External report

b) Detailed report

c) Outline report

d) Exception report

e) Summary report

n 54 0
Which of the following is a measure of how well a computer
system, software applications, or information system can grow
to meet increasing performance demands?
a) Availability

b) Scalability

c) Interoperability

d) Probability

e) Marketability

n 55 0
A security system consisting of hardware and/or software that
prevents unauthorized access to data, information, and
storage media on a network is known as a
a) partition

b) query

c) boot drive

d) cache

e) firewall

n 56 0
Businesses and home computer users can perform several
types of backups. Which of the following is also known as an
archival backup that copies all the files in a computer?
a) Full backup

b) Incremental backup

c) Differential backup

d) Selective backup

e) Partial backup

n 57 0
A disaster recovery plan describes what will be done to restore
computer operations in the event of a disaster. In a disaster
recovery plan, the emergency plan specifies
a) information for simulating various levels of disasters and recording an organization's ability to recover.

b) the steps to be taken immediately after a disaster strikes.


c) the actions to be taken to restore full information processing operations.

d) how backup files and equipment will be used to resume information processing.

e) all security risks that may cause information loss.

n 58 0
In which of the following computer industries would you find
job titles such as project developer, programmer, software
engineer, and computer scientist?
a) Equipment

b) Software

c) Service and repair

d) Sales

e) Education and training

n 59 0
Job titles in the system development and programming area of
an information technology (IT) department include all of the
following EXCEPT:
a) Database administrator

b) Application programmer

c) Systems analyst

d) Help desk specialist

e) Software engineer

n 60 0
Which of the following areas in an information technology (IT)
department evaluates and integrates new technologies,
administers an organization's data resources, and supports
the centralized computer operating system or servers?
a) Operations

b) End-user computing

c) Technical services

d) System development and programming

e) Management

n 61 0
Besides being trusted with the physical security of a
company's property and people, which of the following people
is trusted with securing computing resources?
a) Chief operations officer (COO)

b) Chief security officer (CSO)

c) Chief financial officer (CFO)

d) Chief information officer (CIO)

e) Chief data officer (CDO)

n 62 0
Developers follow established guidelines during the entire
system development process. Which of the following is a
general guideline that system development should NOT
follow?
a) Arrange tasks into phases.
b) Exclude the users.

c) Involve the users.

d) Define standards.

e) Produce documentation.

n 63 0
A LAN can generally extend up to how many kilometers?
a) 50

b) 150

c) 200

d) 1,000

e) 1,500

n 64 0
What does the abbreviation RAD stand for?
a) Right Analysis Data

b) Rare Application Design

c) Random-Access Device

d) Rapid Application Development

e) Radio Airwave Development

n 65 0
When would using the RAD methodology be appropriate?
a) When the system or application needs to be made in 2-3 months.
b) When client and end user input on the system is required.

c) When the system should be made in iterations.

d) When the system will be continuously deployed.

e) When the system can take a lengthy amount of time to be made.

n 66 0
What does the abbreviation JAD stand for?
a) Joint Architecture Design

b) Joint Analysis Division

c) Joint Assembly Demonstration

d) Joint Analog Detection

e) Joint Application Development

n 67 0
Which of the following is considered by some to be office
automation because it enables employees to perform tasks
using computers and other electronic devices instead of doing
them manually?
a) OIS

b) TPS

c) DSS

d) MIS
e) EIS

n 68 0
A decision support system (DSS) helps users analyze data and
make decisions. Internal sources of data might include
a) sales orders

b) interest rates

c) population trends

d) raw material prices

e) product reviews

n 69 0
Which of the following is a special type of DSS that supports
the strategic information needs of the highest management
positions in a company?
a) Transaction processing system (TPS)

b) Management information system (MIS)

c) Office information system (OIS)

d) Consumer information system (CIS)

e) Executive information system (EIS)

n 70 0
An information system that captures and stores the
knowledge of human specialists and then imitates human
reasoning and decision making is known as a(n)
a) office information system
b) transaction processing system

c) expert system

d) management information system

e) decision support system

n 71 0
Artificial intelligence (AI) will mathematically mimic the human
brain using a series of algorithms known as
a) strong AI

b) weak AI

c) expert systems

d) neural networks

e) AI framework

n 72 0
The Digital Millennium Copyright Act (DMCA) prohibits
production and/or dissemination of copyrighted technology,
services, and creative works. Which of the following is NOT
protected by the DCMA?
a) Software

b) Web pages

c) Logos

d) Videos

e) Digital images
n 73 0
When a new computer software is invented to operate in a
new, more efficient way when compared to other related
software, it can be granted a
a) copyright

b) patent

c) trademark

d) trade secret

e) certification mark

n 74 0
ROM units perform which of the following functions?
a) Neither writing nor reading memory content

b) Writing memory content, but not reading it

c) Both reading and writing memory content

d) Reading memory content, but not writing it

e) Computing numerical content

n 75 0
Where is L2 cache located?
a) Within the computer processor

b) Between the computer processor and RAM

c) On a memory card
d) In a computer's program register

e) On the clipboard

n 76 0
A computer's secondary storage is also referred to by which of
the following terms?
a) Mass storage

b) Output devices

c) CD-ROM

d) Sectors

e) Backup storage

n 77 0
An example of a computer peripheral that is both an input and
output device would be a(n)
a) external SSD

b) webcam

c) scanner

d) speakers

e) game controller

n 78 0
Which of the following functions is performed by a video card?
a) It converts the processor's output information into a video signal.
b) It allows individual computers to share peripheral devices.

c) It connects groups of computers within a single building.

d) It takes electric signals and forms an image using points of light.

e) It reads memory content.

n 79 0
What is intellectual property?
a) An idea of a new computer system.

b) Tangible creation from the human intellect.

c) The ability to judge and visualize a room or building.

d) The creation of only a physical invention.

e) The ability to improve a product, process, or service.

n 80 0
Which of the following was one of the original services on the
internet that today is a primary communications method for
both personal and business users?
a) E-commerce

b) FTP

c) Social media

d) Email
e) Browsing the internet

n 81 0
An internet email address is a combination of a username and
a domain name. In an email address, what symbol separates
the username from the domain name?
a) & (ampersand)

b) @ (at)

c) * (asterisk)

d) ~ (tilde)

e) % (percent)

n 82 0
Which of the following is a generally unacceptable means of
communication in which an unsolicited email message or
posting is sent to many recipients at once?
a) An emoji

b) Spam

c) A flame

d) FAQs

e) A link

n 83 0
Which of the following can be used in a less formal setting to
convey emotion in an email or posting?
a) Spam
b) FAQs

c) Emojis

d) Flames

e) Spoilers

n 84 0
Which of the following is NOT a rule included in proper
netiquette?
a) Be polite and avoid offensive language

b) Keep messages brief and use proper grammar and spelling

c) Be careful when using sarcasm and humor

d) Use abbreviations and acronyms for known phrases and names

e) Use all capital letters

n 85 0
Which of the following is NOT an intellectual property mark in
the United States?
a) Trademark

b) Service mark

c) Certification mark

d) Collective mark

e) Approved mark

n 86 0
An organization has created a logo that associates their
company with their products. However, they wish to have a
phrase put on a shirt so that their members can be recognized
as being related to the organization. What mark should the
organization use to achieve this?
a) A collective mark

b) A trademark

c) A certification mark

d) A group mark

e) An organization mark

n 87 0
Which of the following is found before the colon in a web
address that is a protocol defining how a web browser
communicates with the web server whenever sending or
receiving pages or documents?
a) HTML

b) HTTP

c) WWW

d) URL

e) NET

n 88 0
Which of the following is a keyboard shortcut that can be used
to go to the address bar of a web browser without needing to
click on the address bar?
a) Ctrl + L
b) Ctrl + Tab

c) Space

d) Ctrl + D

e) Ctrl + Shift + T

n 89 0
Many businesses and companies utilize social media platforms
to increase all of the following EXCEPT
a) brand awareness

b) website traffic

c) less need for brand campaigning

d) customer support outlets

e) engagement with customers

n 90 0
Some examples of different types of websites are news,
informational, business/marketing, educational, advocacy, and
personal sites. A business/marketing website
a) contains content that promotes or sells products or services

b) offers exciting and challenging avenues for formal and informal teaching and learning

c) contains content that describes a cause, opinion, or idea

d) offers an interactive and engaging environment

e) is maintained by a private individual or family not associated with any organization


n 91 0
An outgoing email server determines how to route sent
messages. Which of the following is a communications
technology used by some outgoing mail servers?
a) TIFF (tagged image file format)

b) ARPA (advanced rural postal addresses)

c) POP3 (post office protocol version 3)

d) HTML (hypertext mail link)

e) SMTP (simple mail transfer protocol)

n 92 0
The process of transferring documents, graphics, and other
objects from a computer to a server on the internet is known
as
a) uploading

b) streaming

c) downloading

d) flowing

e) spamming

n 93 0
FTP (File Transfer Protocol) was once the standard protocol for
protecting against data breaches, but has been replaced by
other protocols today. Which of the following is NOT a secure
alternative to FTP?
a) SFTP (SSH File Transfer Protocol)
b) AS2 (Applicability Statement 2)

c) STFFP (Secure Transfer of Files Forward Protocol)

d) HTTPS (Hypertext Transfer Protocol Secure)

e) MFT (Management File Transfer)

n 94 0
EDI is a set of standards that controls the transfer of business
data and information among computers both within and
among enterprises. Which of the following is becoming a more
reliable and preferred upgrade?
a) FTP (file transfer protocol)

b) URL (uniform resource locator)

c) OCR (optical character recognition)

d) API (application program interface)

e) NAS (network attached storage)

n 95 0
To evaluate the value of a website, users should consider all of
the following criteria EXCEPT the
a) site's affiliation

b) author's credentials

c) site's content

d) internet overseer

e) site's security certificate


n 96 0
In the workplace, the term “social networking” is used to
describe
a) the interaction between employees within a company's computer network

b) a website or application for interacting with professionals within the similar fields of work

c) a network designed for more than one user

d) a website or application for interacting with friends, family, and colleagues

e) a network designed and built by a team of developers and technicians

n 97 0
Some companies and individuals collect and use personal
information without authorization. To make personal data
more private, users should do all of the following when
shopping online EXCEPT
a) limit the amount of information provided to websites

b) avoid shopping club and buyer cards

c) fill in only necessary information on rebate, warranty, and registration forms

d) purchase goods with credit cards without a guaranteed SSL encryption

e) install a cookie manager and personal firewall

n 98 0
A single-user license agreement allows the purchaser to
a) install the software on a network

b) give copies to friends and colleagues


c) install on more than one machine for the same licensed user

d) export the software

e) rent or lease the software

n 99 0
Repetitive strain injuries are a major problem in the United
States. Which of the following is NOT a recommended
precaution a computer user should take to prevent a
repetitive strain injury?
a) Take frequent breaks.

b) Place a wrist rest between the keyboard and the edge of the desk.

c) Use the heel of the hand as a pivot point while typing or using the mouse.

d) Place the mouse at least six inches from the edge of the desk.

e) Minimize the number of switches between the mouse and the keyboard.

n 100 0
When creating a privacy policy for a website that interacts
with user data all of the following should be addressed EXCEPT
a) third party service providers

b) collecting personal data

c) maintaining personal data

d) how the website is built

e) cookies

You might also like