Final Exam

CSC101

Winter 2003


Page 1

 

1.  When calculating an individual's federal income taxes owed, the number representing wages earned is considered ________.

    a. input

    b. output

    c. a calculation

    d. an exemption

    e. a deduction

 

2.  Third-generation computers were characterized by the ________.

    a. microprocessor

    b. stored program

    c. integrated circuit

    d. vacuum tube

    e. transistor

 

3.  The application that reigns supreme in the world of mainframes is (the) ________.

    a. database

    b. spreadsheet

    c. multimedia

    d. desktop publishing

    e. graphics

 

4.  The difference between ROM and RAM is ________.

    a. RAM chips are larger

    b. ROM chips are larger

    c. ROM is nonvolatile

    d. ROM is read only

    e. Both c and d are correct

 

5.  A type of reader commonly used to read UPC code is the ________.

    a. bar-code reader

    b. optical-mark reader

    c. magnetic-ink character reader

    d. both a and c are correct

    e. all of the above are correct

 

6.  The ability of people in diverse locations to conduct meetings by transmitting images and sound over networks is called ________.

    a. telecommunication

    b. video enhancing

    c. videoconferencing

    d. video translating

    e. analog-digital communication

 


Page 2

 

7.  "Natural language" to a programmer refers to ________.

    a. the language we speak and write

    b. the native language of the computer

    c. the language of the particular machine being programmed

    d. the firmware programs that are natural to the hardware

    e. high-level languages designed to write programs

 

8.  An advantage of using integrated software over individual applications is ________.

    a. the applications are designed to work well together

    b. they have all the features of their separately packaged counterparts

    c. they apply a similar look and feel to all of their applications

    d. both a and c are correct

    e. all of the above are correct

 

9.  The ability to automatically transfer data among applications is called ________.

    a. cross-registration

    b. universal coding

    c. autoXfer

    d. interapplication communication

    e. data compatibility

 

10. The ability of a user to issue a command and continue working while the command is executed is called ________.

    a. multitasking

    b. concurrent processing

    c. batch processing

    d. multithreading

    e. multiprocessing

 

11. Text that is smooth on the right and ragged on the left is called ________.

    a. right justification

    b. left justification

    c. center justification

    d. full justification

    e. complete justification

 


Page 3

 

12. Which of the following displays a character as a collection of dots in an invisible grid, with each pixel represented as a black or white bit in a matrix?

    a. bit-mapped fonts

    b. hard fonts

    c. soft fonts

    d. scalable outline fonts

    e. downloadable fonts

 

13. The traditional minimum resolution for professional typesetting is ________.

    a. 100 dpi

    b. 300 dpi

    c. 600 dpi

    d. 1,200 dpi

    e. 1,600 dpi

 

14. Which of the following is an advantage of desktop publishing?

    a. Desktop publishing saves time.

    b. Desktop publishing saves money.

    c. Quality control is easier to maintain when documents are produced in-house.

    d. Both b and c are correct.

    e. All of the above are correct.

 

15. A spreadsheet containing labels and formulas, but no data, is called a ________.

    a. model

    b. template

    c. design

    d. plan

    e. format

 

16. A(n) _____ turns a "what if" question around, allowing you to enter a target value and then find the necessary data values to produce it.

    a. copy

    b. function

    c. link

    d. number link

    e. equation solver

 


Page 4

 

17. A color monitor that uses 8 bits per pixel can store up to ______ different colors.

    a. 2

    b. 8

    c. 16

    d. 64

    e. 256

 

18. Photo-realistic color, potentially containing more than 16 million colors, requires at least ______ bits of memory for each pixel.

    a. 1

    b. 2

    c. 8

    d. 16

    e. 24

 

19. A presentation graphics slide can contain ________.

    a. charts

    b. photographs

    c. tables

    d. both a and c are correct

    e. all of the above are correct

 

20. In a series of still pictures used for animation, one picture is called a ________.

    a. drawing

    b. photograph

    c. frame

    d. sketch

    e. picture

 

21. The most powerful animation programs have tools that add ______ to the image on the screen by working with animated objects in three dimensions.

    a. width

    b. height

    c. depth

    d. color

    e. objects

 

22. An example of a special-purpose database is a ________.

    a. GET

    b. GIS

    c. SQL

    d. ROM

    e. TOPS

 


Page 5

 

23. When working with a DBMS, what is the field called that relates information found in several different files?

    a. primary

    b. key

    c. foreign

    d. master

    e. connector

 

24. The textbook's privacy example of an identity theft by acquiring credit card numbers and other personal data indicated that ________.

    a. with identification and credit card numbers massive charges can accumulate to the wrong person

    b. the owner of a credit card is always liable for purchases charged to it

    c. corrections to databases often take a very long time

    d. both a and c are correct

    e. all of the above are correct

 

25. Outside of a LAN one of the most common types of communication software that allows a personal computer to function as a character-based terminal is ________.

    a. electronic mail software

    b. teleconferencing software

    c. terminal emulation software

    d. bulletin board system

    e. video conferencing software

 

26. Which of the following is NOT true of bandwidth?

    a. The cause of all of the problems on the Internet and other networks is the lack of bandwidth at some point in the path between the sending computer and the receiving computer.

    b. Bandwidth refers to the quantity of information that can be transmitted through a communication medium in a given amount of time.

    c. Increased bandwidth means faster transmission speeds.

    d. Bandwidth is typically measured in Megabits (millions of bits) per second.

    e. Bandwidth can be affected by the physical media that make up the network, the amount of network traffic, the software protocols, and the type of network connection.

 

27. Once a Web page is created, it must be uploaded to ___________ to be seen by the world.

    a. your hard drive

    b. your desktop

    c. your personal computer

    d. a Web server

    e. all of the above are correct

 


Page 6

 

28. To create their databases, search engines find and index the ________.

    a. keywords in documents

    b. number of words in a document

    c. links to and from other documents

    d. both a and b are correct

    e. both a and c are correct

 

29. Specialized search engines can be used to find ________.

    a. phone numbers

    b. e-mail addresses

    c. mailing addresses

    d. lowest prices for items

    e. all of the above are correct

 

30. FAQs

    a. means Frequently Answered Queries.

    b. are lists of old questions and answers.

    c. are used by browsers to find the correct URL.

    d. all of the above are correct.

    e. none of the above is correct.

 

31. Which of the following is using grid computing?

    a. U.S. Department of Defense

    b. U.S. Department of Energy

    c. NASA

    d. Both a and b are correct

    e. All of the above are correct

 

32. In addition to conventional computers, which of the following can be connected to the Internet?

    a. set-top boxes

    b. mobile phones

    c. PDAs

    d. both a and b are correct

    e. all of the above are correct

 

33. "The ePrivacy and Security Report" from the market-research company eMarketer.com estimated that in 2000 ________.

    a. the majority of online fraud cases were related to online auctions

    b. the majority of online fraud cases were related to identity theft

    c. the average cost per victim of online fraud was around $1,000

    d. both a and c are correct

    e. both b and c are correct

 


Page 7

 

34. Which of the following statements is true?

    a. Modern viruses can spread faster and do more damage than older viruses.

    b. The Internet speeds transmission of viruses.

    c. Web pages, macros and other technologies give virus writers new places to hide their creations.

    d. Only a and b are true.

    e. All of the above are true.

 

35. For many who understand computers, the biggest issue of concern related to autonomous military systems is

    a. the unpredictability of the enemy.

    b. that these systems might react too quickly to an attack.

    c. the reliability of the software.

    d. the complexity of the hardware.

    e. that the system could not be completely tested in advance.

 

36. A program is well structured if

    a. it is made up of logically cohesive modules.

    b. the modules are arranged in a hierarchy.

    c. it is straightforward and readable.

    d. both b and c are correct.

    e. all of the above are correct.

 

37. State-of-the-art OCR programs use all of the following techniques EXCEPT ________.

    a. semantics

    b. segmentation of the page

    c. feedback from a human trainer

    d. identifying ambiguous letters by their context

    e. learning from actual examples

 

38. All of the following are true about neural networks EXCEPT

    a. They store information differently from traditional computers.

    b. Concepts are represented as patterns of activity among many neurons.

    c. They can still function if some of their neurons are destroyed.

    d. They are more susceptible to machine failure than traditional computers.

    e. They distribute knowledge throughout the network.

 

39. Laptop computers, personal digital assistants, and notebook computers are all portable computers.

    a. True

    b. False

 


Page 8

 

40. Information appliances allow home as well as office users to connect to the Internet without a full-blown PC.

    a. True

    b. False

 

41. A string of bits can be interpreted as a number, a letter of the alphabet, or almost anything else.

    a. True

    b. False

 

42. CMOS is used to store commonly used programs.

    a. True

    b. False

 

43. The circuit board that connects the computer to the monitor is called the video adapter.

    a. True

    b. False

 

44. The image on the monitor is stored in VRAM.

    a. True

    b. False

 

45. VROM holds the image that is displayed on the monitor.

    a. True

    b. False

 

46. The WIMP failed because of the difficulty of using it.

    a. True

    b. False

 

47. Word processing includes the process of editing text.

    a. True

    b. False

 

48. Justification determines the vertical placement of text.

    a. True

    b. False

 


Page 9

 

49. Reference materials like almanacs and atlases are commonly available in digital form.

    a. True

    b. False

 

50. A spelling checker that checks all the words in a document at one time in response to a command is called an interactive spelling checker.

    a. True

    b. False

 

51. A spelling checker analyzes words in the context of their use.

    a. True

    b. False

 

52. Microsoft introduced a spreadsheet program called Excel.

    a. True

    b. False

 

53. A Fill command always uses absolute referencing.

    a. True

    b. False

 

54. A built-in formula in a spreadsheet that is referenced by name and does a specific set of calculations is called a function.

    a. True

    b. False

 

55. Vector graphics stores pictures as lines, shapes, and other objects.

    a. True

    b. False

 

56. A 3-D computer model can be rotated or stretched.

    a. True

    b. False

 

57. CAM software controls the manufacturing of parts.

    a. True

    b. False

 

58. The standard video rate is 30 frames per second.

    a. True

    b. False

 


Page 10

 

59. A typical Wide Area Network (WAN) includes a collection of computers and peripherals; each computer and shared peripheral is an individual node on the network.

    a. True

    b. False

 

60. For users who work exclusively on a Local Area Network, many communications tasks are taken care of by a network operating system (NOS).

    a. True

    b. False

 

61. When computers and peripherals are connected to a Local Area Network, computer users can share expensive peripherals.

    a. True

    b. False

 

62. Windows-compatible computers can use data files and documents created on a Macintosh and stored on the server.

    a. True

    b. False

 

63. One way to increase bandwidth in a cable is to increase the number of parallel wires in that cable.

    a. True

    b. False

 

64. A vortal is a vertical portal.

    a. True

    b. False

 

65. Internet relay chat (IRC) is an example of real-time communication.

    a. True

    b. False

 

66. A watcher is the term for a person who silently monitors mailing lists and newsgroups without posting messages.

    a. True

    b. False

 

67. Push technology is really pull technology in disguise.

    a. True

    b. False

 


Page 11

 

68. Microsoft's .NET is being built using C#, a proprietary language that only runs on UNIX platforms.

    a. True

    b. False

 

69. The U.S. government still assumes primary responsibility for the expansion of the Internet.

    a. True

    b. False

 

70. During the 1990s several New England states pushed for the development of the Regional Information Infrastructure (RII)ÄÄan affordable, secure, high-speed network to provide "universal service" to all of their residents.

    a. True

    b. False

 

71. Software piracy is the illegal duplication of copyrighted software.

    a. True

    b. False

 

72. The names given to the saboteurs' destructive programs sound more like technology than biology.

    a. True

    b. False

 

73. Many U.S. court decisions have reinforced a company's right to read employee e-mail stored on the company computers.

    a. True

    b. False

 

74. Some of the most important security issues pertain to creating systems that can withstand software errors and hardware glitches.

    a. True

    b. False

 

75. Defining the problem is often the most important and most overlooked step in the problem-solving process.

    a. True

    b. False

 


Page 12

 

76. Since the earliest days of computing, programming languages have continued to evolve toward providing easier communication between people and computers.

    a. True

    b. False

 

77. Alpha testing allows initial versions of popular applications, operating systems, and utilities to be tested by the public.

    a. True

    b. False

 

78. Artificial intelligence is the study of the computations that make it possible to perceive, reason, and act.

    a. True

    b. False

 

79. The early English/Russian automatic translation project became the target of jokes that were effective at pointing out the problems of machine language.

    a. True

    b. False

 

80. The human brain, which isn't particularly good at manipulating knowledge, excels at storing and recalling facts.

    a. True

    b. False

 


Page 1

 

1.  a

2.  c

3.  a

4.  e

5.  a

6.  c

7.  a

8.  d

9.  d

10. a

11. a

12. a

13. d

14. e

15. b

16. e

17. e

18. e

19. e

20. c

21. c

22. b

23. b

24. d

25. c

26. a

27. d

28. e

29. e

30. b

31. e

32. e

33. a

34. e

35. c

36. e

37. a

38. d

39. True

40. True

41. True

42. False

43. True

44. True

45. False

46. False

47. True

48. False

49. True

50. False

51. False

52. True


Page 2

 

53. False

54. True

55. True

56. True

57. True

58. True

59. False

60. True

61. True

62. True

63. True

64. True

65. True

66. False

67. True

68. False

69. False

70. False

71. True

72. False

73. True

74. True

75. True

76. True

77. False

78. True

79. True

80. False