ICS 100 – Example/Practice Quiz – Chapter 1 & 2
Download
Report
Transcript ICS 100 – Example/Practice Quiz – Chapter 1 & 2
ICS 100 – Example/Practice
Quiz – Chapter 1 & 2
Spring 2007
1/24/07
1. All of the following are
examples of real security
and privacy risks EXCEPT:
A.
B.
C.
D.
spam.
Viruses.
hackers.
identity theft.
2.
A.
B.
C.
D.
________ is the science that
attempts to produce machines
that display the same type of
intelligence that humans do
Nanotechnology
Artificial intelligence (AI)
Simulation
Nanoscience
3. ________ is data that has
been organized or presented
in a meaningful fashion.
A.
B.
C.
D.
Software
A program
A process
Information
4.
A.
B.
C.
D.
After a picture has been taken with a
digital camera and processed
appropriately, the actual print of the
picture is considered:
data.
the process.
input.
output.
5. ________ is any part of the
computer that you can
physically touch
A.
B.
C.
D.
A peripheral
A device
An application
Hardware
6. The most common
keyboard uses the
________ layout
A.
B.
C.
D.
Alpha
Numeric
Dvorak
QWERTY
7. The ________ is the
largest and most important
chip in the computer.
A.
B.
C.
D.
RAM chip
memory chip
motherboard
central processing unit (CPU)
8. The hard disk drive is
considered ________
storage.
A.
B.
C.
D.
legacy
temporary
nonvolatile
read-only
9. Data can be a number, a
word, a picture, or a sound.
A. TRUE
B. FALSE
10. The four main functions of a computer
are: input the data, process the data,
output the data or information, and
communicate the data or information.
A. TRUE
B. FALSE
Input process output store data
11. The Windows key is on
both PC and Macintosh
keyboards.
A. TRUE
B. FALSE
Windows key not on a Mac
12. Modern operating systems
recommend that users shut down
the system by pushing the main
power button.
A. TRUE
B. FALSE
Shut Down Through OS using the Mouse
“Start Turn Off Computer” in Windows