Final Exam
CSC101
Winter 2003
Page 1
1. When
calculating an individual's federal income taxes owed, the number representing
wages earned is considered ________.
a. input
b. output
c. a calculation
d. an exemption
e. a deduction
2. Third-generation
computers were characterized by the ________.
a. microprocessor
b. stored program
c. integrated circuit
d. vacuum tube
e. transistor
3. The
application that reigns supreme in the world of mainframes is (the) ________.
a. database
b. spreadsheet
c. multimedia
d. desktop publishing
e. graphics
4. The
difference between ROM and RAM is ________.
a. RAM chips are larger
b. ROM chips are larger
c. ROM is nonvolatile
d. ROM is read only
e. Both c and d are correct
5. A type of
reader commonly used to read UPC code is the ________.
a. bar-code reader
b. optical-mark reader
c. magnetic-ink
character reader
d. both a and c are
correct
e. all of the above are
correct
6. The ability
of people in diverse locations to conduct meetings by transmitting images and
sound over networks is called ________.
a. telecommunication
b. video enhancing
c. videoconferencing
d. video translating
e. analog-digital
communication
Page 2
7. "Natural
language" to a programmer refers to ________.
a. the language we
speak and write
b. the native language
of the computer
c. the language of the
particular machine being programmed
d. the firmware
programs that are natural to the hardware
e. high-level languages
designed to write programs
8. An
advantage of using integrated software over individual applications is
________.
a. the applications are
designed to work well together
b. they have all the
features of their separately packaged counterparts
c. they apply a similar
look and feel to all of their applications
d. both a and c are
correct
e. all of the above are
correct
9. The ability
to automatically transfer data among applications is called ________.
a. cross-registration
b. universal coding
c. autoXfer
d. interapplication
communication
e. data compatibility
10. The ability
of a user to issue a command and continue working while the command is executed
is called ________.
a. multitasking
b. concurrent
processing
c. batch processing
d. multithreading
e. multiprocessing
11. Text that
is smooth on the right and ragged on the left is called ________.
a. right justification
b. left justification
c. center justification
d. full justification
e. complete
justification
Page 3
12. Which of
the following displays a character as a collection of dots in an invisible
grid, with each pixel represented as a black or white bit in a matrix?
a. bit-mapped fonts
b. hard fonts
c. soft fonts
d. scalable outline
fonts
e. downloadable fonts
13. The
traditional minimum resolution for professional typesetting is ________.
a. 100 dpi
b. 300 dpi
c. 600 dpi
d. 1,200 dpi
e. 1,600 dpi
14. Which of
the following is an advantage of desktop publishing?
a. Desktop publishing saves time.
b. Desktop publishing saves money.
c. Quality control is easier to maintain when
documents are produced in-house.
d. Both b and c are correct.
e. All of the above are correct.
15. A
spreadsheet containing labels and formulas, but no data, is called a ________.
a. model
b. template
c. design
d. plan
e. format
16. A(n) _____ turns a "what if" question around,
allowing you to enter a target value and then find the necessary data values to
produce it.
a. copy
b. function
c. link
d. number link
e. equation solver
Page 4
17. A color
monitor that uses 8 bits per pixel can store up to ______ different colors.
a. 2
b. 8
c. 16
d. 64
e. 256
18. Photo-realistic
color, potentially containing more than 16 million colors, requires at least
______ bits of memory for each pixel.
a. 1
b. 2
c. 8
d. 16
e. 24
19. A
presentation graphics slide can contain ________.
a. charts
b. photographs
c. tables
d. both a and c are
correct
e. all of the above are
correct
20. In a series
of still pictures used for animation, one picture is called a ________.
a. drawing
b. photograph
c. frame
d. sketch
e. picture
21. The most
powerful animation programs have tools that add ______ to the image on the
screen by working with animated objects in three dimensions.
a. width
b. height
c. depth
d. color
e. objects
22. An example
of a special-purpose database is a ________.
a. GET
b. GIS
c. SQL
d. ROM
e. TOPS
Page 5
23. When
working with a DBMS, what is the field called that relates information found in
several different files?
a. primary
b. key
c. foreign
d. master
e. connector
24. The
textbook's privacy example of an identity theft by acquiring credit card
numbers and other personal data indicated that ________.
a. with identification
and credit card numbers massive charges can accumulate to the wrong person
b. the owner of a
credit card is always liable for purchases charged to it
c. corrections to
databases often take a very long time
d. both a and c are
correct
e. all of the above are
correct
25. Outside of
a LAN one of the most common types of communication software that allows a
personal computer to function as a character-based terminal is ________.
a. electronic mail
software
b. teleconferencing
software
c. terminal emulation
software
d. bulletin board
system
e. video conferencing
software
26. Which of
the following is NOT true of bandwidth?
a. The cause of all of the problems on the
Internet and other networks is the lack of bandwidth at some point in the path
between the sending computer and the receiving computer.
b. Bandwidth refers to the quantity of information
that can be transmitted through a communication medium in a given amount of
time.
c. Increased bandwidth means faster transmission
speeds.
d. Bandwidth is typically measured in Megabits
(millions of bits) per second.
e. Bandwidth can be affected by the physical media
that make up the network, the amount of network traffic, the software
protocols, and the type of network connection.
27. Once a Web
page is created, it must be uploaded to ___________ to be seen by the world.
a. your hard drive
b. your desktop
c. your personal
computer
d. a Web server
e. all of the above are
correct
Page 6
28. To create
their databases, search engines find and index the ________.
a. keywords in
documents
b. number of words in a
document
c. links to and from
other documents
d. both a and b are
correct
e. both a and c are
correct
29. Specialized
search engines can be used to find ________.
a. phone numbers
b. e-mail addresses
c. mailing addresses
d. lowest prices for
items
e. all of the above are
correct
30. FAQs
a. means Frequently
Answered Queries.
b. are lists of old
questions and answers.
c. are used by browsers
to find the correct URL.
d. all of the above are
correct.
e. none of the above is
correct.
31. Which of
the following is using grid computing?
a.
b.
c. NASA
d. Both a and b are correct
e. All of the above are correct
32. In addition
to conventional computers, which of the following can be connected to the Internet?
a. set-top boxes
b. mobile phones
c. PDAs
d. both a and b are
correct
e. all of the above are
correct
33. "The ePrivacy and Security Report" from the market-research
company eMarketer.com estimated that in 2000 ________.
a. the majority of online
fraud cases were related to online auctions
b. the majority of
online fraud cases were related to identity theft
c. the average cost per
victim of online fraud was around $1,000
d. both a and c are
correct
e. both b and c are
correct
Page 7
34. Which of
the following statements is true?
a. Modern viruses can spread faster and do more
damage than older viruses.
b. The Internet speeds transmission of viruses.
c. Web pages, macros and other technologies give
virus writers new places to hide their creations.
d. Only a and b are true.
e. All of the above are true.
35. For many
who understand computers, the biggest issue of concern related to autonomous
military systems is
a. the unpredictability
of the enemy.
b. that these systems
might react too quickly to an attack.
c. the reliability of
the software.
d. the complexity of
the hardware.
e. that the system
could not be completely tested in advance.
36. A program
is well structured if
a. it is made up of
logically cohesive modules.
b. the modules are
arranged in a hierarchy.
c. it is
straightforward and readable.
d. both b and c are
correct.
e. all of the above are
correct.
37. State-of-the-art
OCR programs use all of the following techniques EXCEPT ________.
a. semantics
b. segmentation of the
page
c. feedback from a
human trainer
d. identifying
ambiguous letters by their context
e. learning from actual
examples
38. All of the
following are true about neural networks EXCEPT
a. They store information differently from
traditional computers.
b. Concepts are represented as patterns of
activity among many neurons.
c. They can still function if some of their
neurons are destroyed.
d. They are more susceptible to machine failure
than traditional computers.
e. They distribute knowledge throughout the
network.
39. Laptop
computers, personal digital assistants, and notebook computers are all portable
computers.
a. True
b. False
Page 8
40. Information
appliances allow home as well as office users to connect to the Internet
without a full-blown PC.
a. True
b. False
41. A string of
bits can be interpreted as a number, a letter of the alphabet, or almost
anything else.
a. True
b. False
42. CMOS is
used to store commonly used programs.
a. True
b. False
43. The circuit
board that connects the computer to the monitor is called the video adapter.
a. True
b. False
44. The image
on the monitor is stored in VRAM.
a. True
b. False
45. VROM holds
the image that is displayed on the monitor.
a. True
b. False
46. The WIMP
failed because of the difficulty of using it.
a. True
b. False
47. Word
processing includes the process of editing text.
a. True
b. False
48. Justification
determines the vertical placement of text.
a. True
b. False
Page 9
49. Reference
materials like almanacs and atlases are commonly available in digital form.
a. True
b. False
50. A spelling
checker that checks all the words in a document at one time in response to a
command is called an interactive spelling checker.
a. True
b. False
51. A spelling
checker analyzes words in the context of their use.
a. True
b. False
52. Microsoft
introduced a spreadsheet program called Excel.
a. True
b. False
53. A Fill
command always uses absolute referencing.
a. True
b. False
54. A built-in
formula in a spreadsheet that is referenced by name and does a specific set of
calculations is called a function.
a. True
b. False
55. Vector
graphics stores pictures as lines, shapes, and other objects.
a. True
b. False
56. A 3-D
computer model can be rotated or stretched.
a. True
b. False
57.
a. True
b. False
58. The
standard video rate is 30 frames per second.
a. True
b. False
Page 10
59. A typical
Wide Area Network (WAN) includes a collection of computers and peripherals;
each computer and shared peripheral is an individual node on the network.
a. True
b. False
60. For users
who work exclusively on a Local Area Network, many communications tasks are
taken care of by a network operating system (NOS).
a. True
b. False
61. When
computers and peripherals are connected to a Local Area Network, computer users
can share expensive peripherals.
a. True
b. False
62. Windows-compatible
computers can use data files and documents created on a Macintosh and stored on
the server.
a. True
b. False
63. One way to
increase bandwidth in a cable is to increase the number of parallel wires in
that cable.
a. True
b. False
64. A vortal is a vertical portal.
a. True
b. False
65. Internet
relay chat (IRC) is an example of real-time communication.
a. True
b. False
66. A watcher
is the term for a person who silently monitors mailing lists and newsgroups
without posting messages.
a. True
b. False
67. Push
technology is really pull technology in disguise.
a. True
b. False
Page 11
68. Microsoft's
.NET is being built using C#, a proprietary language that only runs on UNIX
platforms.
a. True
b. False
69. The
a. True
b. False
70. During the
1990s several
a. True
b. False
71. Software
piracy is the illegal duplication of copyrighted software.
a. True
b. False
72. The names
given to the saboteurs' destructive programs sound more like technology than
biology.
a. True
b. False
73. Many
a. True
b. False
74. Some of the
most important security issues pertain to creating systems that can withstand
software errors and hardware glitches.
a. True
b. False
75. Defining
the problem is often the most important and most overlooked step in the
problem-solving process.
a. True
b. False
Page 12
76. Since the
earliest days of computing, programming languages have continued to evolve
toward providing easier communication between people and computers.
a. True
b. False
77. Alpha
testing allows initial versions of popular applications, operating systems, and
utilities to be tested by the public.
a. True
b. False
78. Artificial
intelligence is the study of the computations that make it possible to
perceive, reason, and act.
a. True
b. False
79. The early
English/Russian automatic translation project became the target of jokes that
were effective at pointing out the problems of machine language.
a. True
b. False
80. The human
brain, which isn't particularly good at manipulating knowledge, excels at
storing and recalling facts.
a. True
b. False
Page 1
1. a
2. c
3. a
4. e
5. a
6. c
7. a
8. d
9. d
10. a
11. a
12. a
13. d
14. e
15. b
16. e
17. e
18. e
19. e
20. c
21. c
22. b
23. b
24. d
25. c
26. a
27. d
28. e
29. e
30. b
31. e
32. e
33. a
34. e
35. c
36. e
37. a
38. d
39. True
40. True
41. True
42. False
43. True
44. True
45. False
46. False
47. True
48. False
49. True
50. False
51. False
52. True
Page 2
53. False
54. True
55. True
56. True
57. True
58. True
59. False
60. True
61. True
62. True
63. True
64. True
65. True
66. False
67. True
68. False
69. False
70. False
71. True
72. False
73. True
74. True
75. True
76. True
77. False
78. True
79. True
80. False