Mid-Term #1 Solutions Chapter #1: Computers: Tools for an Information Age 1. Computers introduce the _________ element into the modern economy. A. labor B. information C. capital D. land Answer: B 2. Pie charts are an example of computer applications in: A. cooking. B. robotics. C. graphics. D. connectivity. Answer: C 3. The set of instructions that tell a computer what to do is called a: A. instruction set. B. programmer. C. program. D. system. Answer: C 4. Which of the following is not a secondary storage device? A. CD-ROM B. hard disk C. DVD-ROM D. central processing unit Answer: D 5. The term that refers to all input, output, and secondary storage devices is: A. peripheral B. central C. attached D. network Answer: A 6. Which of the following is not considered to be a peripheral device? A. disk drive B. keyboard C. monitor D. memory Answer: D 7. The Internet is owned by: A. the U.S. government. B. a private business. C. an international consortium of universities. D. nobody. Answer: D 8. A computer that operates as a connection point in a network for other computers to connect to is called a(n): A. server. B. browser. C. modem. D. ISP. Answer: A 9. The protocol describing standard rules for Internet communication is: A. ISP. B. Web browser. C. TCP/IP. D. LAN. Answer: C 10. The term “Internet Service Provider” refers to: A. a computer that contains shared software. B. a company that provides Internet connectivity for users. C. software that enables communications between computers. D. a Web site containing a home page. Answer: B 11. The type of software you will typically use to explore the Web is a(n): A. ISP. B. home page. C. browser. D. Web site. Answer: C 12. Which type of computer is least likely to have its own secondary storage? A. PDA B. workstation C. mainframe D. thin client Answer: D Chapter 2: Applications Software: Getting the Work Done 13. The general term used for describing software that helps solve everyday personal or business tasks is: A. custom software. B. system software. C. application software. D. vertical software. Answer: C 14. Software that a company’s computer programmers write specifically for the company’s own use is: A. custom software. B. system software. C. application software. D. vertical software. Answer: A 15. A program that includes the opportunity for programmers to modify or enhance its code is called: A. open source. B. public domain. C. freeware. D. custom software. Answer: A 16. Database management software is most appropriate for: A. performing complex mathematical calculations. B. keeping a catalog of all inventory in stock. C. preparing high-quality advertisements and informational brochures. D. downloading important data files from the Internet. Answer: B 17. If you wanted to calculate your budget and play what-if games based on different assumptions of income and expenditures, you would be most likely to use: A. database management software. B. spreadsheet software. C. communications software. D. graphics software. Answer: B 18. Communications software is most appropriate for: A. performing complex mathematical calculations. B. storing a list of important phone numbers. C. preparing high-quality advertisements and informational brochures. D. downloading important data files from the Internet. Answer: D 19. The term vertical market software refers to: A. business software that is primarily used by marketing companies. B. software used primarily in tower computers. C. business software geared to a particular industry of business function. D. volume discount software licenses with steadily declining costs. Answer: C 20. Another term for groupware is: A. integrated application. B. vertical market software. C. collaborative software. D. help desk software. Answer: C 21. A help desk is a(n): A. ergonomically designed workspace for doing computer work. B. online documentation file that comes with software. C. instructor’s manual. D. company’s information and support center. Answer: D 22. Which of the following would not be considered to be software piracy? A. A company buys a single-user copy of software and distributes it to all its employees. B. A student copies software from the school’s computer lab in order to install it on his own computer at home. C. A person buys a copy of software and copies it to another CD for backup purposes. D. A person buys a CD, installs it on her own computer, and then gives the CD to her friend to install on the friend’s computer. Answer: C 23. Which of the following people is responsible for ensuring that computers in an organization can connect with and communicate effectively with each other? A. Computer programmer B. CIO C. Data entry operator D. Network manager Answer: D 24. Which of the following people plans, oversees, and manages all the information technology functions for an organization? A. Computer programmer B. Systems analyst C. Computer operator D. CIO Answer: D Chapter 3: Operating Systems: Software in the Background 25. An operating system is considered to be: A. computer hardware. B. application software. C. system software. D. memory. Answer: C 26. Which of the following types of software would not be considered to be system software? A. operating system. B. utility programs. C. program language translators. D. spreadsheet software. Answer: D 27. The main part of an operating system is called a(n): A. computer operator. B. kernel. C. utility program. D. operations manager. Answer: B 28. When we refer to software as “resident,” this means: A. it is installed on the hard drive. B. it controls the hardware. C. it resides in the home of the user. D. it remains in memory. Answer: D 29. The term that refers to allocation of resources to programs for limited amounts of time is called: A. time events. B. response timing. C. time-sharing. D. time allocation. Answer: C 30. Which is the most likely cause of degradation in a system’s performance? A. Queueing B. Interruptions C. Thrashing D. Time slicing Answer: C 31. Which of the following would not be considered to be a utility program? A. A file manager B. A defragmenter C. A device driver D. An operating system Answer: D 32. What will the operating system do if a file needs to be saved to disk, but there is not enough contiguous space on the disk to accommodate the file’s size? A. The operating system will display an error message to the user. B. The system will freeze up. C. The file will be fragmented and placed in noncontiguous locations. D. The file will be loaded into virtual storage. Answer: C 33. Manufacturers of peripheral hardware devices include special software utilities to help the operating system send commands to the hardware devices. This software is referred to as: A. B. C. D. Answer: C managers directories drivers compressors Chapter 8: The Internet at Home and in the Workplace 34. The precursor to the Internet, which connected four university computer systems, was called: A. Intranet. B. ARPANET. C. NSFNet. D. CERNNet. Answer: B 35. Navigation in the World Wide Web is accomplished by clicking on: A. Windows menus. B. hyperlinks. C. TCP packets. D. browsers. Answer: B 36. The type of software that provides users with the capability to navigate through the Web is called: A. navigation software. B. a browser. C. an ISP. D. a hyperlink. Answer: B 37. A message sent over the Internet is composed of uniformly sized: A. packets. B. browsers. C. links. D. protocols. Answer: A 38. A plug-in is: A. a computer program that plugs into an expansion card or port. B. a special Web site that allows users to gain additional services. C. a software component that enhances the browser’s functionality. D. a small program embedded in a Web page that runs when the browser loads the page. Answer: C 39. An applet is: A. a special feature of Web site activation provided by Apple Corporation. B. a small WAP-enabled device for providing mobile access to the Web. C. a software component that enhances the browser’s functionality. D. a small program embedded in a Web page that runs when the browser loads the page. Answer: D 40. If you want to log onto a computer over the Internet and allow your PC to emulate a terminal on that computer, you would use: A. Usenet. B. FTP. C. Telnet. D. e-mail. Answer: C 41. You will use FTP to: A. send email attachments to other users over the Internet. B. upload or download files over the Internet. C. remotely log into a host computer via the Internet. D. post and read newsgroup messages via the Internet. Answer: B 42. Which type of address will include an @ symbol before the domain? A. IP address. B. e-mail address. C. http Web address. D. intranet portal address. Answer: B 43. The category of e-commerce that takes place between a construction company and its materials supplier is called: A. bricks-and-clicks. B. B2C. C. intranets. D. B2B. Answer: D 44. The term portal refers to: A. a special form of banner ad that links to the Web site for the company being advertised. B. a personalized Web page that provides access to Web sites of interest and presents customized advertisements to the user. C. a dedicated Internet connection between a company and its suppliers. D. a secure firewall, which is like a doorway that needs a special key in order to open. Answer: B 45. The most intrusive and distracting form of Internet advertisement is: A. banner. B. pop-over. C. context-sensitive. D. portal. Answer: B 46. A(n) ________ is a private network typically used internally by a single company, that utilizes tunneling technology to create private channels of communication through the Internet. A. WAN B. intranet C. VPN D. extranet Answer: C 47. What was the first computer bug? A. A burned out tube B. A broken wire C. A moth caught in a relay D. A misplaced punch card Answer: C 48. The first commercially successful GUI was part of the Mac OS and was introduced in A. 1978 B. 1984 C. 1987 D. 1990 Answer: B 49. The three fundamental characteristics of computers are: A. speed, storage capability, variety of applications. B. reliability, speed, storage capability. C. cost effectiveness, speed, variety of applications. D. cost effectiveness, reliability, storage capability. Answer: B 50. The most important program in the operating system, that manages the operating system, is called A. the kernel. B. DOS. C. systems software. D. bootstrapping. Answer: A