True or False - cloudfront.net

Download Report

Transcript True or False - cloudfront.net

Computer Test Review
Lessons 3 and 4
Adding random access
memory is relatively simple
because additional memory
expansion cards fit easily
into slots on the computer’s
motherboard.
•True
A ____ is used to add memory or
connect peripheral devices to a
notebook computer.
a. hacker card
b. modem clip
c. PC card
d. Mac disk
c. PC card
The speed of the CPU,
which is measured in
megahertz, is determined
by the system clock.
•True
Graphical interfaces and ____
interfaces are the two most
common types of user interfaces.
a. information
b. DOS
c. operations
d. command-line
d. command-line
In a GUI, ____ represent files,
disks, programs, and other objects.
a. PCs
b. symbols
c. commands
d. windows
b. symbols
Unix is a type of utility
program.
•False
A digital camera is an example of a
peripheral that connects to new
computers with a ____ port.
a. Serial
b. Fan
c. MIDI
d. USB
d. USB
Which of the following is NOT a
routine maintenance task for
computer systems?
a. visual inspection
b. checking e-mail
c. deleting
temporary files
d. checking cables
for wear
b. checking e-mail
A PS/2 port is also
sometimes called a
camera port.
•False
An alliance that was formed in
1993 to produce the PowerPC
family of CPU chips included IBM,
Motorola, and ____.
a. Apple
b. Walmart
c. Honda
d. Dell
a. Apple
A file management
program is an example of
a utility program.
•True
Install a(n) ____ to avoid losing
data if the power goes off during a
thunderstorm.
a. surge protector
b. uninterruptible
power source
c. universal serial
bus
d. CD-ROM drive
b. uninterruptible
power source
____ is software you can use on a
trial basis before paying a
registration fee.
a. Bundle
b. Shareware
c. Plug and play
d. Freeware
b. Shareware
With a graphical
interface, you must type
the exact command you
wish to execute.
•False
Adding or changing components of
a computer to make it faster or
more efficient is called ____.
a. maintaining
b. upgrading
b. upgrading
c. operating
d. troubleshooting
Windows 98 was the first version
of Windows to integrate ____ into
the operating system.
a. the Internet
b. algorithms
c. icons
d. the monitor
a. the Internet
The Windows operating
system works with the
Motorola processor.
•False
A good source of help with
computer problems is ____.
a. computer manuals
b. support technicians
c. a technical support
telephone number
d. all of the above
d. all of the
above
A ____ is a device that allows one
computer to talk to another via a
cable connection.
a. Scanner
b. Mouse
c. Modem
d. USB port
c.
Modem
Regular visual inspection
is an important part of
routine maintenance for
computer components.
•True
How many bits of data can a serial
port transmit at a time?
a. One
b. Two
c. Eight
d. 12 million
a. One
Software developers have
had a tremendous impact
on the history of
computers.
•True
IBM introduced its first IBM PC
around ____.
a. 1975
b. 1980
c. 1985
d. 1990
b. 1980
Another word for
"program" is "hardware."
•False
Which is one of the most widely
used command-line interfaces for
microcomputers?
a. DOS
b. RAM
c. Visual Basic
d. BASIC
a. DOS
A command-line interface
allows you to see files
and disks represented as
images you can select.
•False
Systems software refers to the
computer's ____ system.
a. computing
b. operating
c. applications
d. productivity
b.
operating
Most hardware
components available
today are called park and
play because they must
be carefully positioned
before using.
•False
When you turn on a computer, you
____ the system.
a. bug
b. kick
c. boot
d. skip
c.
boot
A small computer system interface
port found in many older computer
models is more commonly called
a(n) ____ port.
a. MIDI
b. parallel
c. cable
d. SCSI
d. SCSI
It is not necessary to
register new equipment
to have access to
technical support.
•False
When you start your computer, the
first action that the computer
performs is ____.
a.
b.
c.
d.
BIOS
CHKDSK
ROM
POST
d. POST
Skilled computer users who invade
computer systems and write virus
programs are called ____.
a. bugs
b. firewalls
c. spikes
d. hackers
d. hackers
The Mac OS is not
commonly used in
conjunction with DOS.
•True
Which of the following is NOT a
utility program?
a. file recovery
d. calendar
b. disk
defragmentation
c. antivirus
d. calendar
One computer can run a
combination of operating
systems.
•True
Which statement about
multitasking is true?
a. It prohibits multiple programs
from running simultaneously.
b. It is a character-based
operating system.
c. It manipulates programs that
reside on the hard drive.
d. It allows a single user to work
on two programs at one time.
d.It allows a
single user to
work on two
programs at
one time.
Increasing storage
capacity or adding more
memory are reasons for
considering a computer
upgrade.
•True
An error in programming code is
called a(n) ____.
a. syntax
b. algorithm
c. bug
d. moth
c.
bug
Computers only understand ____, so
programs written in programming
languages must be translated before
computers can use them.
a. standard English
b. machine
language
c. Visual Basic
d. Mac OS
b. machine
language
Which of the following factors will
damage removable storage media?
a. extreme
temperatures
b. magnetic fields
c. touching the surface
of the media
d. all of the above
d. all of the
above
Computers with Windows
operating systems often
have Intel Pentium chips.
•True
A ____ operating system allows a
group of computers to be
connected.
a. network
b. system
c. BIOS
d. graphical
a. network
The final step in the
troubleshooting process should
always be to ____.
a. contact a support
technician
b. avoid similar problems
in the future
c. clean the computer’s
case
d. check the cables
b. avoid
similar
problems in
the future
Which is NOT a category of systems
software?
a. operating systems c.
b. utilities
c. multimedia
d. language
translators
multimedia
Application software is
developed for the end
user.
•True
The Macintosh computer was
introduced in the ____.
a.
b.
c.
d.
1960s
1970s
1980s
1990s
c.
1980s
A peripheral device must
be physically connected
to the computer.
•True
Analyzing computer problems to
correct faults in the system is
called ____.
a. maintenance
d. troubleshooting
b. fragmenting
c. hacking
d. troubleshooting
You should never try to
replicate a computer
problem when trying to
solve the problem.
•False