Practice Questions Computer Questions For Various Exams
1. All of the following are examples of real security and privacy risks EXCEPT:
hackers.
spam.
viruses.
identity theft.
2. A process known as------------- is used by large retailers to study trends.
data mining
data selection
POS
data conversion
3. ---------terminals (formerly known as cash registers) are often connected to complex inventory and sales computer systems.
Data
Point-of-sale (POS)
Sales
Query
4. A(n)-----------------system is a small, wireless handheld computer that scans an items tag and pulls up the current price (and any special offers) as you shop.
PSS
POS
inventory
data mining
5. The ability to recover and read deleted or damaged files from a criminals computer is an example of a law enforcement specialty called:
robotics.
simulation.
computer forensics.
animation.
6. Which of the following is NOT one of the four major data processing functions of a computer?
gathering data
processing data into information
analyzing the data or information
storing the data or information
7. ----------tags, when placed on an animal, can be used to record and track in a database all of the animals movements.
POS
RFID
PPS
GPS
8. Surgeons can perform delicate operations by manipulating devices through computers instead of manually. This technology is known as:
robotics.
computer forensics.
simulation.
forecasting.
9. Technology no longer protected by copyright, available to everyone, is considered to be:
proprietary.
open.
experimental.
in the public domain.
10. ---------is the study of molecules and structures whose size ranges from 1 to 100 nanometers.
Nanoscience
Microelectrodes
Computer forensics
Artificial intelligence
11. ---------------is the science that attempts to produce machines that display the same type of intelligence that humans do.
Nanoscience
Nanotechnology
Simulation
Artificial intelligence (AI)
12. ----------------is data that has been organized or presented in a meaningful fashion.
A process
Software
Storage
Information
13. The name for the way that computers manipulate data into information is called:
programming.
processing.
storing.
organizing.
14. Computers gather data, which means that they allow users to ____________ data.
present
input
output
store
15. After a picture has been taken with a digital camera and processed appropriately, the actual print of the picture is considered:
data.
output.
input.
the process.
16. Computers use the ----------language to process data.
processing
kilobyte
binary
representational
17. Computers process data into information by working exclusively with:
multimedia.
words.
characters.
numbers.
18. In the binary language each letter of the alphabet, each number and each special character is made up of a unique combination of:
eight bytes.
eight kilobytes.
eight characters.
eight bits.
19. The term bit is short for:
megabyte.
binary language.
binary digit.
binary number.
20. A string of eight 0s and 1s is called a:
megabyte.
byte.
kilobyte.
gigabyte.
21. A ____________ is approximately one billion bytes.
kilobyte
bit
gigabyte
megabyte
22. A ____________ is approximately a million bytes.
gigabyte
kilobyte
megabyte
terabyte
23. ____________ is any part of the computer that you can physically touch.
Hardware
A device
A peripheral
An application
24. The components that process data are located in the:
input devices.
output devices.
system unit.
storage component.
25. All of the following are examples of input devices EXCEPT a:
0 comments:
Post a Comment