Details of this Paper

saint com203 all module quizes [ module 1,2,3,4,5,6,7,8 quiz ]




Question;Which term refers to a collection of inter-linked documents, graphics, and sounds that can be accessed over the Internet?2G NetworkDigital TelevisionFreeform DatabaseVisual DatabaseWorld Wide Web/WebQuestion 2. Question:The Internet was first developed for whom?America Online (AOL)cambridge UniversityMicrosoftThe United States MilitaryVice President Al GoreQuestion 3. Question:Which of the following is a generic term used to refer to symbols that represent facts, objects, and ideas, which a computer can manipulate?Student Answer: CORRECT DataEntitiesQueriesReportsWisdomQuestion 4. Question:Which term refers a named collection of data copied unto a storage medium, such as a hard disk, CD, or flash drive?BIOSClusterFilePortSectorQuestion 5. Question:A megabyte is the same as which of the following?1,048,576 bits2 to the power of 10 (= 1,024) KilobytesExactly one million bytesOne half of a GigabyteTwo TerabytesQuestion 6. Question:How many bytes are required to store a single letter in extended ASCII?: 1282561,024Question 7. Question:Which of the following is the Extended ASCII code for an uppercase "A" in binary (base 2)?0000 00000000 000A0100 0001A000 00001111 1111Question 8. Question:Which of type of language is typically used by programmers to create programs that control digital devices?Command LanguageProgramming LanguageQuery LanguageSystem LanguageTeutonic LanguageQuestion 9. Question:Which type of computer program that translates source code of an entire program as a batch into object code which it places into a separate file?ComplierDatabaseInterpreterOperating SystemSpreadsheetQuestion 10. Question:Which term refers to any method to confirm a person's identity based upon something they know, possess, or are?Authentication ProtocolAuthorization ProtocolElectoral CollegeUser IDValidation ProcedureQuestion 11. Question:Under which act are Sarah Palin?s e-mails and the FBI?s file on Roswell made available?Affordable Health Care InitiativeFreedom of Information ActNo Child Left BehindPatriot ActSarbanes-Oxley ActQuestion 12. Question:The first major role computers played in marketing was to do which of the following?Creating graphics and typesetting print addsCustomizing mass market form lettersE-commerce web sitesStatistical analysis of surveys and sales dataVideo and audio editing of broadcast addsquiz 2Which term refers to the case which holds a computer's main circuit boards, microprocessor, memory, power supply, and storage devices?BusCachePeripheral DevicePrimary StorageSystem UnitQuestion 2. Question:Which term refers to the high speed circuitry which connects the processor to the system and transports data to and from the processor?Arithmetic Logic Unit (ALU)CacheFront Side Bus (FSB)Instruction Pointer (IP)RegistersQuestion 3. Question:A processor with which of the following word sizes would be able to manipulate the largest number of bits at one time?: 1 bit8 bit16 bit32 bit64 bitQuestion 4. Question:Which type of storage uses light reflecting areas called lands and non-reflective areas called pits to record data?Analog StorageMagnetic StorageMechanical StorageOptical StorageSolid State Storage:Question 5. Question:Which term refers to the average time it takes a computer to locate data in a storage device, such as a hard disk, and read it?Access TimeLatencySeek TimeTransfer TimeWait State TimeQuestion 6. Question:Which event occurs when the read/write head of a hard disk drive mechanically hits the platter and damages some of the data on the disk?Head CrashMagnetic LeakageMagnetic DecayPlatter SkipStack OverflowQuestion 7. Question:Which term refers to the number of colors a device can display, typically denoted as the number of bits to represent the color of each pixel?Color DepthDot PitchScreen ResolutionScreen SizeViewing Angle:Question 8. Question:Which general term refers to a small circuit board which plugs into an expansion slot, and gives the computer the ability to control a storage, input, or output device?BusCoprocessorEthernet CardExpansion CardModemQuestion 9. Question:Which technology used in display devices/monitors produces an image by filtering light through a matrix of liquid crystal cells?Cathode Ray Tube (CRT)Light Emitting Diode (LED)Liquid Crystal Display (LCD)Plasma ScreenQuestion 10. Question:Which term refers to a small, reinforced, oval shaped hole in a computer case into which you can insert a lock attached to a cable, which can in turn be fastened to a desk to prevent theft?Anchor PortBolt BracketKensington Security SlotSurge ProtectorUSB SlotQuestion 11. Question:According to the Environmental Protection Agency (EPA), how much E-waste is discarded each year?30 Tons300 Tons3,000 Tons3 Million Tons3 Billion TonsQuestion 12. Question:Which military communications project evolved into the modern Internet?Area 51ARPANETManhattan ProjectOperation OverlordProject PXquiz 3Which type of software alters a devices user interface to aid individuals with physical challenges, by creating as accessible environment by providing closed captions, text-to-speech, speech-to-text, or large screen text?Adaptive UtilitiesCompilersDesktop PublishingGroupwareSpreadsheetQuestion 2. Question: Which are the two main classes of software?Compilers and UtilitiesProductivity and GamesSystem and ApplicationSystem and NetworkUtilities and ApplicationQuestion 3. Question: Which type of application software are Microsoft Excel, Lotus 123, and OpenOffice Calc?DatabasePresentation SoftwareSpreadsheetWord ProcessorWeb BrowserQuestion 4. Question: In database terminology, which term refers to all of the data for a specific, single entity - a person, place, thing or event?DatabaseFieldFormQueryRecordQuestion 5. Question: Which term refers to placing a program into a computer so it can be run on?DownloadingInstallationJail BreakingRootingUploadingQuestion 6. Question: Which type of file is designed to be started by the user or automatically launched by an operating system?Assembler FileConfiguration FileData FileExecutable File (Exe)Object FileQuestion 7. Question: Which is the official term for software which has been illegally copied, distributed, or modified?Cracked SoftwareFreewareHighjacked SoftwareGasparillawarePirated SoftwareQuestion 8. Question: Which type of software license allows the software to be used on all computers at a specified location?Multiple-User LicenseShrink Wrap LicenseSingle User LicenseSite LicenseUnlimited Local LicenseQuestion 9. Question: Which software tool is used to conceal malware and backdoors that have been installed on a computer?BotRootkitVirusWormZombieQuestion 10. Question: Which term refers to a file that contains suspicious code, typically resembling a virus signature, which has been encrypted and moved so that it cannot be inadvertently opened or accessed by a hacker?Bot FileIsolated FileQuarantined FileRoot KitSecured Threat FileQuestion 11. Question: According to the textbook, what is the cash value of pirated software to date?$53 Million$530 Million$5.3 Billion$53 Billion$530 BillionQuestion 12. Question: Which reporter converted an M-88 tank into a high tech mobile news room to cover Operation Iraqi Freedom, but died during the conflict?Arthur MillerDavid BloomEthel GahwhilerJeff RaucherIrving L. Levinequiz 5Which term refers to a 32 bit binary number, often written as four groups of decimal numbers separated by commas, which potentially changeable, and is used to identify a network device on the Internet?DHD CoordinateIP AddressMAC (Media Access Control) AddressNetwork Address TranslationIN Uniform Resource LocatorPoints Received: 0 of 10Comments:Question 2. Question:Which is the official term for parcels of data which are sent across a computer network and contain some data, the addresses of its sender and destination, and a sequence number?Data WaveEncapsulated Posted FilePacketPipelineTransfer UnitComments:Question 3. Question:Which type of WI-FI configuration allows all devices to broadcast directly to each other?WIreless Ad HocWireless Discovery ModeWireless Filibuster ModeWireless InfrastructureWireless Token RingComments:Question 4. Question:Which communication media does Blue Tooth use?Category 5 or 6 Twisted Pair CableInfrared LightOptical CableRadio WavesVisible LightQuestion 5. Question:Which technology makes intercepted WI-FI signals useless to eavesdroppers/interceptors?Cyclical Redundancy Checks (CRC)Electronic CountermeasuresError ing CodesFirewallsWireless EncryptionQuestion 6. Question:Which type of network device connects two different types of networks?Network CollectiveNetwork GatewayNetwork HubNetwork SwitchNetwork RouterQuestion 7. Question:In Windows 7, which of the following is a collection of trusted networked computers that automatically share files and folders?Access groupCollective groupHome groupTrust groupWork groupComments:Question 8. Question:Which term refers to allowing other computers on a LAN to use the printer connected to your workstation?Collective Printer AccessPrinter DeprivatizationPrinter MultiplexingPrinter SharingVirtual PrintersComments:Question 9. Question:Which size length of cryptographic bit key would require the longest to break?8 bits16 bits64 bits256 bits1,024 bitsComments:Question 10. Question:Which is the official term of the encoded text of a message after it has been encrypted?Cipher textClear textPlaintextSafetextTransformed textPoints Received: 0 of 10Comments:Question 11. Question:Which brand of hand held devices was found in 2011 to keep time stamped, triangulated position data, essentially keeping a log of the location of the user carrying them?Kindle E-ReaderApple iPadApple iPhoneNook E-ReaderSportsman's Diving WatchesComments:Question 12. Question:Which term refers to the use of Internet and Computers to deliver courses when the instructor and student are not in the same physical location?Computer Aided Instruction (CAI)Computer Aided Learning (CAL)Computer Based Training (CBT)Distance Education/Distance LearningLearning Management Software (LMS)Comments:quiz 6How many bits are in a current (IPv4) IP address?216321281,024Points Received: 10 of 10Comments:Question 2. Question:Which type of Internet Access links your computer to an ISP from a stationary point, such as a wall socket or roof mounted antenna?Fixed AccessIntegrated AccessMobil AccessPortable AccessSimplex AccessPoints Received: 10 of 10Comments:Question 3. Question:Which type of fixed Internet Connection has the longest latency?CableDial UpDSLISDNSatelliteQuestion 4. Question:Which type of fixed Internet Connection is NOT always on?CableDSLISDNSatelliteWiMAXQuestion 5. Question:Which level of cell phone service allows users to view simplified versions of some popular web pages, but not the all pages nor full pages?Analog1G2GMobile BroadbandWAPPoints Received: 0 of 10Comments:Question 6. Question:Which level of cell phone service is needed to access the full versions of all web pages?Analog1G2GMobile BroadbandWAPPoints Received: 10 of 10Comments:Question 7. Question:Which type of application is specifically created to aid with the transfer of large numbers of files by FTP?Encryption ApplicationFTP ClientFTP ServerInstant MessengerWeb BrowserPoints Received: 10 of 10Comments:Question 8. Question:Which term refers to the concept of using local devices to access applications, storage, and other computing resources supplied by Internet-based servers, rather than from their local devices?Cloud ComputingDistributed ComputingNet RetrievalParallel ProcessingRemote StoragePoints Received: 0 of 10Comments:Question 9. Question:Which type of IP Address can be used to route packets on the Internet at large?General IP AddressLoopback IP AddressPrivate IP AddressRoutable IP AddressUntranslatable IP AddressQuestion 10. Question:Which of the following ranges are NOT private IP Addresses? to to to to Received: 10 of 10Comments:Question 11. Question:The government of which country was recently overthrown through the use of Facebook, Twitter, and blogs?AlbaniaCanadaEgyptMexicoUnited StatesQuestion 12. Question:According to the textbook, how much does it cost to purchase, install, and operate an ATM for one year?$500$5,000$50,000$500,000$5,000,000quoz 4Which term refers to the operating system process and memory management that allows two or more tasks, jobs, or programs to run simultaneously?CoordinatingExclusivityLogistics ControlMutli-taskingNon-Conflicting AllocationQuestion 2. Question:Which term refers to the time between when the coputer is first turned on and the time it is ready to accept commands?Cold Start ProcessBoot Up ProcessIgnition ProcessStart Up ProcessWake Up CycleQuestion 3. Question:Which operating system was released for free use under a GPL (General Public License) in 1991 and is loosely based upon a UINX derived operating system?Android OSDOS (Disk Operating System)LinuxMac OS XWindows 7Question 4. Question:Which operating system was specifically designed for the Apple Macintosh line of computers and is based on the UNIX operating system?Android OSDOS (Disk Operating System)LinuxMac OS XWindows 7Question 5. Question:Which term refers to the suffix at the end of a file name, following the period, which is normally used to specify the file type, in Windows?File ClassFile ExtensionFile IdentifierFile SuffixFile TagQuestion 6. Question:Which term refers to the top level directory on a disk or drive, such as "C:\" or "E:\"?Drive DirectoryMother DirectoryRoot DirectorySuper DirectoryTree DirectoryQuestion 7. Question:Which technique for writing an optical disc such as a CD, DVD, or BD, allow recording to be done in multiple sessions?Disc MasteringIncremental BurningPacket WritingDisc RippingStampingQuestion 8. Question:Which type utility software protects confidentiality by overwriting supposed empty disk sectors from deleted files with random 0's and 1's.?Backup UtilityDisk DefragmenterFile Shredder SoftwareFile Sector EditorNet NannyQuestion 9. Question:Which type of backup makes a fresh copy of all files specified to be backed up?Differential BackupFull BackupIncremental BackupRestore DiskRestore PointQuestion 10. Question:Which term refers to a bit-by-bit copy of all data from all sectors of a hard disk?Disk ImageFull BackupIncremental BackupRestore DiskRestore PointQuestion 11. Question:Robert Morris, who released a worn which brought down the ARPANET in 1988, received which sentence for this crime?None400 hours of community service and $10,000 fine5 years probation and $10,000 fine10 years in prison15 years to life in prison:Question 12. Question:Which term refers to an irresistible or web site containing fake information that allows investigators to monitor hackers until identification is possible?BaitBear TrapFly TrapHoney PotSirenquiz 7="color:>="color:>="color:>iven the URL,, which of the following is the file name with extension?/classics/htmlhttp://main.htmlwww.miskatonic.eduQuestion 2. Question:Web pages are text files, formatted using a standard set of tags called which of the following?FTPHTMLINTPLaTexWWWQuestion 3. Question:Which component of a search engine pulls keywords from web pages and stores then in the database?ComparatorDatabaseSearch Engine IndexerQuery ProcessorWeb CrawlerComments:Question 4. Question:Which term refers to a rating of a web page based on the quality and quantity of links it contains?Anchor WeightGunning Fog IndexLink PopularityLink Power ScoreIN Link Quality IndexComments:Question 5. Question:Which type of e-commerce business model is Amazon dot Com?B2B (Business to Business)B2C (Business to Consumer)B2G (Business to Government)C2C (Consumer to Consumer)G2C (Government to Consumer)Comments:Question 6. Question:Which type of e-commerce business model are Craigslist dot Com and Ebay dot Com?B2B (Business to Business)B2C (Business to Consumer)B2G (Business to Government)C2C (Consumer to Consumer)G2C (Government to Consumer)Comments:Question 7. Question:Which process converts binary files, such as digital photos and sound files, into ASCII code based text which can be sent as an e-mail attachment and travel over the Internet with text based data?ASCII EncodingB2A ConversionMulti-Purpose Internet Mail Extensions (MIME)Text Representing Binary Data (TRBD)ZA EncodingComments:Question 8. Question:Which term refers to e-mail which contains HTML tags to format the text with fonts, colors, and effects and embed graphics?ASCII MailExtended Format MailHTML MailXML MailWeb MailComments:Question 9. Question:Which type of cookie tracks a user's browsing pattern and uses it to pick targeted, custom advertisements?Ad Serving CookieBread CrumbChart CookieTolle Haus CookieWeb BugComments:Question 10. Question:Which type of computer crime is the "Nigerian political refugee letter"?Ad Serving CookiePharmingPhishingSpamWeb BugComments:Question 11. Question:Which event has been cited to justify the erosion Fourth Amendment rights mandating judicial oversight for law enforcement to access for email or place wiretraps?Iran Contra AffairRoswell IncidentTeapot Dome ScandalTerrorist Attacks of September 11, 2001Watergate ScandalComments:Question 12. Question:How many bits of data may an RFID tag contain?1 to 4 bits4 to 8 bits8 to 32 bits64 to 128 bits256 to 1,024 bitsComments:quiz 8Which sound file format is used on commercially produced audio CDs?AACCDDAIN MP3Ogg VorbisWAVComments:Question 2. Question:Which term specifically refers to online audio that plays as the file downloads?IN Advanced Audio CodingCDDACompressed AudioPodcast AudioStreaming AudioComments:Question 3. Question:Which is the official term that refers to an individual cell of an image on a display surface?DatumDotElementPixelPointPoints Received: 10 of 10Comments:Question 4. Question:Which is the official term for a type of bitmap which stores only one bit per pixel?BinaryMonochromePolarSimpleTrue Color:Question 5. Question:Which of the following is NOT drawing software (which is application software intended for creating vector graphics)?Adobe IllustratorAdobe PhotoshopCorel DesignerInkScapeOpen Office DrawQuestion 6. Question:Which type of software converts a bitmap into a vector graphics file?Filtering SoftwareMelding SoftwareRasterizing SoftwareRendering SoftwareTracing Software:Question 7. Question:Which term refers to the general process of converting digital video from one format to another?Adaptive FilteringBarrier SynchronizingCompressionSynchronizingTranscodingQuestion 8. Question:Which digital video file format is native for DVD players?ASFBDMVFLVIN MOVVOBQuestion 9. Question:Which DRM (Digital Rights Management) technology includes a code number to specify a region of the world in which DVD players, may play which discs?Broadcast FlagIN Copy Generation ManagementCSS (Content Scramble System)FairPlayHDCP (High-bandwidth Digital Content ProtectionQuestion 10. Question:Which term refers to a collection of technologies used by copyright holders to limit access to and use of digital content?Authentication and AuthorizationCopyright Enforcement Technology (CET)Confidentiality, Integrity, and Accessibility (CIA) CriteriaDigital Rights Management (DRM)Secure Digital Vaults (SDV):Question 11. Question:Which law makes it illegal to circumvent any technological measure that controls access to a work?Antitrust Act of 1923Digital Millennium Copyright ActForth Amendment to the U.S. ConstitutionPatriot Act of 2001Piracy Act of 1820Question 12. Question:Which computer program was used to render the over two million blue hairs on the character Sully in the 2002 film, Monsters Inc.?Bullet TimeFiztHoudiniMASSIVERenderman="color:>


Paper#36593 | Written in 18-Jul-2015

Price : $67