Stop being stupid, You cannot copy content of this page
One impact on medication preparation. Explain.
July 15, 2019
NUR-504 Week 7 Assignment CLC – EBP Develop Clinical Guideline And Implementation Plan
July 15, 2019

CSIT 105 exam

CSIT 105 Exam 1
1)
Being ________ means being familiar enough with computers that you understand their capabilities and limitations. (1 point)
technology literate
computer competent
computer savvy
computer literate

2)
Unwanted or junk e-mail is called ________. (1 point)
spam
spyware
adware
software

3)
The process of searching huge amounts of data with the hope of finding a pattern is called ________. (1 point)
data retrieval
data searching
data mining
data warehousing

4)
The technology called QR codes stands for ________. (1 point)
quiet reader
quick response
quiet response
quick reaction

5)
One potential application of ________ is to provide sight to the blind. (1 point)
VeriChips
biomedical chip implants
RFID tags
patient simulators

6)
Which of the following is an example of data mining? (1 point)
An Excel spreadsheet listing all employees and their annual salaries in a random order
A printout of all sales taken from the register at the end of the day
Raw data from questionnaires given at the mall
Amazon providing you with a list of books you might enjoy

7)
The difference between people with access to computers and the Internet and those without this access is known as the ________. (1 point)
digital divide
Web divide
Internet divide
broadband divide

8)
Which of the following software can best be used to help create digital art? (1 point)
Microsoft Word
Microsoft Excel
Adobe Illustrator
Adobe Acrobat

9)
________ is the gathering together of groups of people using online tools to connect and exchange ideas. (1 point)
Affective computing
Collaborative consumption
Information technology
Social networking

10)
The crisis-mapping tool ________ can collect information to make instantly and publicly available for use in emergencies. (1 point)
The Witness Project
data mining
Marahabaa
Ushahidi

11)
Analyzing computer systems to gather potential legal evidence is ________. (1 point)
computer detectives
forensics detectives
computer forensics
computer enforcement

12)
Joining together as a group to use a specific product more efficiently is called ________. (1 point)
creative surplus
collaborative consumption
social networking
affective computing

13)
Affective computing is ________. (1 point)
being able to recognize human fingerprints
speaking human language
computing that relates to emotions
performing calculations faster than humans

14)
What’s the best type of computer for a sales rep who travels extensively and often needs to take notes and show product spec pages to clients in their offices, but has no need for high-performance graphics?(1 point)

All-In-One PC
Tablet PC
PC Notebook

15)
Which of the following is the best reason why somebody might choose a Mac Book Pro? (1 point)
Needs a portable system with Internet access.
Needs access to a portable system that can be used to present PowerPoint Presentations.
Needs a portable system with high-performance graphical capabilities.

16)
Which of the following is not a computer peripheral? (1 point)
Printer
Motherboard
Keyboard and mouse

17)
Which of the following is your computer’s main memory that holds programs, data, and instructions currently in use for quick access by the processor? (1 point)
RAM
USB Flash
ROM

18)
Computers use the ________ language consisting of 0s and 1s. (1 point)
symbol
system
binary
byte

19)
Which of the following is the largest unit of measure for the size of a computer file? (1 point)
Petabyte
Megabyte
Gigabyte
Terabyte

20)
Any part of the computer that you can touch is called ________. (1 point)
software
hardware
operating system
input

21)
The term “bit” is short for ________. (1 point)
megabyte
binary digit
binary number
binary language

22)
What type of computer is the Apple iPad?(1 point)
Netbook
Tablet computer
Notebook
Tablet PC

23)
The ________ contains the central electronic components of the computer. (1 point)
system unit
peripheral unit
input unit
motherboard

24)
In binary language, each letter of the alphabet, each number, and each special character is made up of a unique combination of ________. (1 point)
eight characters
eight kilobytes
eight bits
eight bytes

25)
A keyboard and mouse are examples of ________ devices. (1 point)
storage
output
input
processing

26)
Apple developed ________ Mouse, which is the first multitouch wireless mouse. (1 point)
Taboo
Magic
Trick
Touch

27)
________ is the abbreviation for the place in the computer where the programs and data the computer is currently using are stored. (1 point)
CPU
ROM
RAM
USB

28)
RAM is a ________ storage location. (1 point)
nonvolatile
permanent
network
volatile

29)
Large, expensive computers that support many users simultaneously are called ________. (1 point)

powercomputers
mainframes
supercomputers
maxicomputers

30)
________ is the applied science concerned with designing and arranging machines and furniture so that people use so that the people using them aren’t subjected to an uncomfortable or unsafe experience. (1 point)
Occupational safety
Positioning
Ergonomics
Repetitive strain prevention

31)
Which tool would you use in Internet Explorer to return to the page you just viewed? (1 point)
Refresh
Press ENTER
The Back button

32)
How would you reply to an e-mail you’ve received that has multiple recipients, all of whom you would like to see your reply? (1 point)
Click Forward
Click Reply to All
Click Reply

33)
Facebook and YouTube are considered to be ________ Web sites. (1 point)
social networking
phishing
e-commerce
business-to-business

34)
A computer connected to the Internet that asks for data is a ________.(1 point)
client
backbone
client/server network
server

35)
Podcasts enable you to ________. (1 point)
post journal entries on the Web
edit video files over the Web
communicate with friends in real time
deliver audio/video files via RSS

36)
The unique identification number assigned to your computer when you connect to the Internet is known by all of the following, EXCEPT ________. (1 point)
dotted period
dotted decimal
dotted quad
IP address

37)
Using the Web to communicate and share information with our friends and others is known as ________. (1 point)

friend networking
e-mailing
instant messaging
social networking

38)
All of the following are examples of multimedia, EXCEPT ________. (1 point)
graphics
text
MP3 music files
streaming video

39)
All of the following are tips for professional e-mail etiquette, EXCEPT ________. (1 point)
include a meaningful subject line
use abbreviations such as “u”, “r”, and “BRB” to keep the e-mail message shorter
be concise and to the point
use spell-checker and proofread before sending

40)
The “s” in “https” stands for ________. (1 point)
secure socket line
secure socket lock
secure socket link
secure socket layer

41)
A ________ is a Web site where anyone can add, remove, or edit its content. (1 point)
wiki
blog
webcast
podcast

42)
The unique address for a particular Web site is the ________. (1 point)
protocol
domain name
URL
path

43)
Podcasts deliver their content using ________. (1 point)
Google Reader
iTunes
Aggregator
Really Simple Syndication

44)
A subset of e-commerce that uses social networks to assist in marketing and purchasing products is known as ________. (1 point)
social business
social shopping
social commerce
social enterprise

45)
Match the following terms to their definition: (5 points)
Terms
Definitions
WWW
an application program used to view the Web
browser
electronic communication
Internet
a tool used to locate information on the Web
search engine
a large network of networks
e-mail
the means of accessing information over the Internet

46)
Which tool would you use if you wanted to trim a half-inch from the left side of a digital photograph? (1 point)
Crop
Resize
Trim

47)
Where would you find answers to common questions about a product? (1 point)
About
FAQs
Sitemap

48)
Where would you go to see how much RAM is installed on your computer? (1 point)
Right-click the C: drive in Windows Explorer and click Properties.
In the System section of the Control Panel.
In the Help and Support window.

49)
Software refers to a set of instructions that tells the computer what to do. These instruction sets are called ________. (1 point)

databases
devices
programs
peripherals

50)
The general software you use to do tasks at home, school, or work is known as ________ software.(1 point)
commercial
application
open source
system

51)
______ software is the software that helps run the computer and coordinate instructions between the computer and the hardware devices. (1 point)
Application
System
Backup
Recovery

52)
The cell address C5 indicates that the cell ________. (1 point)
contains a label value of “C5”
is at column C, row 5 of the worksheet
is used in a formula involving the value “C5”
is at row C, column 5 of the worksheet

53)
In a spreadsheet, equations that use addition, subtraction, multiplication, and division operators, as well as values and cell references are called ________. (1 point)
functions
calculations
formulas
values

54)
The appropriate software to use for creating research papers is ________. (1 point)
database software
spreadsheet software
word processing software
presentation software

55)
The type of software that is best used to create a simple budget is ________. (1 point)
spreadsheet software
database software
word processing software
presentation software

56)
________ software helps you manage e-mail, contacts, calendars, and tasks in one place. (1 point)
Personal information manager
Spreadsheet
Database
Word processing

57)
QuickBooks and Peachtree are examples of ________ software.(1 point)
accounting
course management
gaming
educational

58)
Software that does “back office” operations and processing functions such as billing, production, inventory management, and human resources management is called ________. (1 point)
enterprise resource planning software
accounting software
customer relationship management software
project management software

59)
All of the following are types of multimedia and entertainment software, EXCEPT ________. (1 point)
digital audio software
productivity software
gaming software
drawing software

60)
Computer-aided design software is used primarily by ________. (1 point)
airline pilots to navigate
project managers to track tasks
game makers to create games
engineers to create models

61)
The ________ is(are) the group of programs that controls how your computer functions. (1 point)
application software
utility programs
operating system
user interface

62)
The ________ of the operating system enables the user to communicate with the computer system.(1 point)
window
user interface
network adapter card
modem

63)
Which of the following was the first widely used operating system installed in personal computers? (1 point)
Symbian OS
Microsoft Windows
MS-DOS
Linux

64)
Robotic cameras used by television stations for sports events require a ________ operating system. (1 point)
multiuser
real-time
single-user, multitask
single-user, single-task

65)
Which of the following operating systems is used primarily with mainframes as a network operating system? (1 point)
Symbian OS
Windows Vista
Mac OS
UNIX

66)
More than 50% of smartphones use an operating system developed by ________. (1 point)
Google
Apple
Symbian
Microsoft

67)
Which of the following is the first step in the boot process? (1 point)
The OS is loaded into RAM.
The BIOS is activated by turning on the computer.
The BIOS checks that all devices are in place.
Configuration and customization settings are checked.

68)
The basic input/output system is stored on a ________ chip. (1 point)
CMOS
CPU
ROM
RAM

69)
Which of the following does NOT occur during the power-on self-test?(1 point)
The video card and video memory are tested.
The BIOS is identified.
Memory is tested.
The OS is moved into RAM.

70)
Errors in computer software are called ________. (1 point)
spiders
bugs
insects
ants

71)
The location of a file is specified by its ________. (1 point)
file type
file extension
drive letter
file path

72)
The process of optimizing RAM storage by borrowing hard drive space is called ________. (1 point)
page file
thrashing
virtual memory
swap file

73)
Which of the following types of programs help manage system resources such as the hard drive? (1 point)
Productivity software
Application software
Utility programs
Application programming interfaces

74)
You can use the Windows ________ to check on a nonresponsive program. (1 point)
System Restore
Explorer
Task Manager
Backup utility

75)
Which utility takes out redundancies in a file to reduce the file size? (1 point)
File Compression
Error-Checking
Disk Cleanup
System Restore

76)
The rule of thumb that predicts that CPU capacity will double every two years is called ________. (1 point)
Intel’s Law
Express Rule
Moore’s Law
CPU Rule

77)
The dominant system processors on the market are made by ________. (1 point)
Apple
Intel
Microsoft
AMD

78)
Which of the following activities is carried out by the arithmetic logic unit (ALU)? (1 point)
Movement of read/write heads
Creation of virtual memory
Completion of all arithmetic calculations
Coordination of all other computer components

79)
All of the following are part of the machine cycle, EXCEPT ________.(1 point)
fetch
encode
store
execute

80)
The CPU consists of which two parts? (1 point)
The control unit and the arithmetic logic unit
The control unit and the front side bus
The arithmetic logic unit and the front side bus
The control unit and cache memory

81)
Running the CPU at a faster speed than the manufacturer recommends is called ________. (1 point)
fetching
clock speed
overclocking
hyperthreading

82)
The amount of RAM recommended for most systems today is measured in ________. (1 point)
KB
gigahertz
megahertz
GB

83)
RAM is an example of ________ storage. (1 point)
permanent
nonvolatile
volatile
mobile

84)
A ________ uses electronic memory and has no motors or moving parts. (1 point)
mechanical hard drive
solid state drive
digital video disc
Blu-ray disc

85)
Running the Disk Defragmenter utility will ________. (1 point)
detect and remove spyware
make the hard drive work more efficiently
clear out temporary Internet files
clean out your Startup folder

86)
Running the Disk Cleanup utility is a quick way to ________. (1 point)
clean out your Startup folder
defrag your hard drive

remove spyware programs
clear out unnecessary files

87)
Video cards include their own RAM. (1 point)
true
false

88)
You can add unlimited RAM to any computer. (1 point)
false
true

89)
Accessing data from the hard drive to send to the CPU is faster than accessing data from RAM. (1 point)
false
true

90)
Solid state drives have no platters or motors. (1 point)
false
true

91)
The ________ computer had no keyboard or monitor and used switches on the front of it to enter data using 0s and 1s. (1 point)
TRS-80
Apple II
Commodore PET
Altair

92)
The ________ was the first portable computer. (1 point)
IBM PC
Osborne
Apple Macintosh
Commodore PET

93)
What programming language revolutionized the software industry because beginning students could learn it easily?(1 point)
ALGOL
COBOL
FORTRAN
BASIC

94)
Released in 1984, the Apple Macintosh was the first computer brought to market that used a graphical user interface (GUI). (1 point)
false
true

95)
A compiler is a program that translates computer language instructions into English language. (1 point)
false
true

96)
Match the following issues with the appropriate example: (5 points)

Issues
Examples
cyberbullying
protection afforded to creators of intellectual property
amoral behavior
the study of the general nature of morals and the specific moral choices made by individuals
copyright
not conforming to a set of approved behavioral standards
unethical behavior
having no sense of right and wrong and no interest in the moral consequences
ethics
harassing people by electronic means

 

“Looking for a Similar Assignment? Get Expert Help at an Amazing Discount!”


CSIT 105 exam was first posted on July 15, 2019 at 1:43 pm.
©2019 "Essay Associates". Use of this feed is for personal non-commercial use only. If you are not reading this article in your feed reader, then the site is guilty of copyright infringement. Please contact me at admin@essayassociates.com

 

"Are you looking for this answer? We can Help click Order Now"