Name: 
 

CS-110 Review 2



Multiple Choice
Identify the choice that best completes the statement or answers the question.
 

 1. 

Which of the following has the same intent as a cracker, but does not have the technical skills and knowledge?
a.
hacker
c.
cyberextortionist
b.
script kiddie
d.
cyberterrorist
 

 2. 

To read encrypted data, the recipient must decipher it into a readable form. What is the term for this process?
a.
re-securing
c.
assessment
b.
decryption
d.
digitization
 

 3. 

Which of the following provides the mobile user with a secure connection to the company network server?
a.
XPN
c.
TPN
b.
SPN
d.
VPN
 

 4. 

Which of the following terms refers to making a copy of a file?
a.
restoring
c.
encrypting
b.
backing up
d.
deciphering
 

 5. 

Personal computers, display devices, and printers should comply with guidelines of which of the following programs?
a.
ENERGY STAR
c.
ACCEPTABLE USE
b.
SECURE ELECTRONICS
d.
GREEN COMPUTING
 

 6. 

Which of the following laws provides the same protection that covers mail and telephone communications to electronic communications such as voice mail?
a.
Electronic Communications Privacy Act (ECPA)
b.
Fair Credit Reporting Act
c.
Computer Fraud and Abuse Act
d.
Computer Matching and Privacy Protection Act
 
 
COGNITIVE ASSESSMENT
 

 7. 

Which of the following best describes the term, cybercrime?
a.
online or Internet-based illegal acts
b.
any illegal act involving a computer
c.
a type of gaming software that simulates criminal acts
d.
using the Internet to apprehend and prosecute criminals
 

 8. 

Which term is used to describe software used by cybercriminals?
a.
cyberware
c.
criminalware
b.
conware
d.
crimeware
 

 9. 

Which of the following statements is not true about Internet and network attacks?
a.
No central administrator is present on the Internet.
b.
It is usually the responsibility of the network administrators to take measures to protect a network from security risks.
c.
Information kept on an organization’s premises has a higher security risk than information transmitted over networks.
d.
Internet and network attacks that jeopardize security include malware, botnets, denial of service attacks, back doors, and spoofing.
 

 10. 

What is the general term for programs that act without a user’s knowledge and deliberately alter the computer’s operations?
a.
malware
c.
evilapp
b.
cybersoft
d.
viralware
 

 11. 

The term, payload, as it pertains to computer crime, is defined as _____________.
a.
the money a criminal receives from extortion or other computer crimes
b.
the amount of data loss to a company or individual who is a victim of a computer crime
c.
the destructive event or prank the program is intended to deliver
d.
the financial burden computer crime places on its victims
 

 12. 

The term, botnet, means _____________.
a.
a program that performs a repetitive task on a network
b.
spam sent via email to spread viruses or commit a distributed denial of service attack
c.
a group of compromised computers connected to a network that attacks other networks
d.
a computer whose owner is unaware that the computer is being controlled remotely by an outsider
 

 13. 

A perpetrator is using a botnet. Which of the following is the least likely use of his botnet?
a.
sending spam via email
b.
spreading viruses
c.
committing a distributed denial of service attack
d.
authoring ActiveX scripts
 

 14. 

Which of the following is the least likely motive for a DDoS?
a.
political anger
c.
extortion
b.
spoofing
d.
negative recognition
 

 15. 

What happens during a DDoS attack?
a.
An unsuspecting computer is used to send an influx of confusing data messages or useless network traffic.
b.
Antivirus software disables a virus and protects the computer or network from unauthorized access.
c.
The police use a virus and other measures to take down a network of computer criminals.
d.
A zombie army is used to attack computers or computer networks.
 

 16. 

Which of the following refers to a technique intruders use to make their network or Internet transmission appear legitimate to a victim computer or network?
a.
spoofing
c.
veiling
b.
phishing
d.
costuming
 

 17. 

The term firewall is _____________.
a.
the access point a hacker uses to intrude on a computer or network
b.
a program that searches for cybercriminals by looking for patterns in attacks
c.
hardware and/or software that protects a network’s resources from intrusion
d.
a virus that prevents the computer or network from accessing outside resources
 

 18. 

Which of the following statements is not true about software theft?
a.
A keygen distributes user names and passwords to those who register their legally purchased copies of a software program.
b.
Software piracy is the unauthorized and illegal duplication of copyrighted software.
c.
With a single-user license agreement, users are permitted to make one copy of the software as a backup.
d.
Software theft includes disabling or removing programs from company computers.
 

 19. 

Which of the following statements is not a safeguard against the failure of hardware?
a.
surge protectors
c.
device-tracking apps
b.
fault-tolerant computers
d.
UPS
 

 20. 

When a user runs an application, what transfers from a storage device to memory?
a.
cache
c.
instructions
b.
registrations
d.
operations
 

 21. 

If a computer advertisement states a computer operates at 5 GHz, what does that mean?
a.
The computer contains 5 GHz of RAM.
b.
The CPU in the computer is an Intel processor.
c.
The system clock has a clock speed of five billion clock cycles per second.
d.
It guarantees the computer runs faster than one that operates at 4 GHz.
 

 22. 

What numbering system uses only the numbers 0 and 1?
a.
octo system
c.
8-bit system
b.
binary system
d.
ASCII system
 

 23. 

If you see eight numbers such as 01000101 grouped together and you are told these numbers represent the letter E, what is this combination of numbers called?
a.
the American Symbolic Code for Information Interchange
b.
a coding scheme
c.
multicode
d.
symbolic codecs
 

 24. 

Memory access times can be measured in fractions of a second. When measuring memory access times, which of the following is the fastest?
a.
millisecond
c.
picosecond
b.
microsecond
d.
nanosecond
 

 25. 

What component converts the AC power in a wall plug to the DC power required by a computer?
a.
electrical alternator
c.
AC/DC flip-flop power switch
b.
power supply
d.
power surge and adaptation coordinator
 

 26. 

What is the best analog for a 32-bit bus?
a.
a 32-engine car
c.
a 32-lane highway
b.
a 32-foot wide warehouse
d.
all of the above
 

 27. 

Who created the mouse that is used on millions of computers today?
a.
Steve Wozniak
c.
Susan Nimura
b.
Albert Keys
d.
Douglas Engelbart
 

 28. 

Which type of optical scanner works in a manner similar to a copy machine?
a.
pen scanner
c.
flatbed scanner
b.
sheet-fed scanner
d.
drum scanner
 

 29. 

Which of the following technologies uses a separate transistor to apply charges to each liquid crystal cell?
a.
standard-matrix
c.
dynamic-matrix
b.
organic-matrix
d.
active-matrix
 

 30. 

What type of printer forms characters and graphics on a piece of paper without actually contacting the paper, such as an inkjet printer?
a.
a nonimpact printer
c.
a nonstrike printer
b.
a noncontact printer
d.
a nonpressure printer
 

 31. 

What act addresses the computing and other requirements of individuals in the workplace who have or may develop physical limitations?
a.
Physical Limitations Act
c.
Americans with Disabilities Act
b.
Computer Assistance Act
d.
American Support Act
 

 32. 

What is storage media?
a.
The software used to display items in storage.
b.
The hardware that records and retrieves items from storage.
c.
The physical material on which a computer keeps data, instructions, and information.
d.
The data and information stored on a computer.
 

 33. 

Which of the following storage devices typically has the fastest transfer rate?
a.
RAM
c.
memory card
b.
hard disk
d.
optical disc
 

 34. 

Before any data can be read from or written on a hard disk, what must happen to the disk?
a.
partitioning
c.
formatting
b.
wiping
d.
encrypting
 

 35. 

Some personal computer manufacturers provide a hard disk configuration that connects multiple smaller disks into a single unit that acts like a single large hard disk. What is this grouping called?
a.
RAID
c.
RPM
b.
AXS
d.
ACIS
 

 36. 

What best describes an optical disc?
a.
a disc made of metal, plastic, and lacquer that can add additional hard drive storage
b.
a portable device made for photographs and other visual file types
c.
a storage device used for digital cameras
d.
a flat, round portable disc that is written and read by a laser
 

 37. 

Which of the following disc types can be written onto, but not erased?
a.
CD-X
c.
CD-RW
b.
CD-ROM
d.
CD-R
 

 38. 

Which of the following refers to the process of writing on an optical disc?
a.
bleeding
c.
browning
b.
burning
d.
blaring
 

 39. 

A popular use of CD-RW and CD-R discs is to create audio CDs. What is the process of copying audio and/or video data from a purchased disc and saving it on digital media called?
a.
rooting
c.
revolving
b.
ripping
d.
revving
 

 40. 

Which of the following is another term for the system unit?
a.
form factor
c.
motherboard
b.
chassis
d.
chip
 

 41. 

Which of the following is a small piece of semiconducting material, usually silicon, on which integrated circuits are etched?
a.
computer plug
c.
computer chip
b.
computer port
d.
computer roster
 

 42. 

Which of the following is the component of the processor that directs and coordinates most of the operations in the computer?
a.
control unit
c.
compression unit
b.
concatenation unit
d.
micro unit
 

 43. 

Double Data Rate SDRAM (DDR SDRAM) chips are even faster than SDRAM chips because which of the following is true?
a.
They transfer data twice for each clock cycle.
b.
They are synchronized to the system clock.
c.
They do not have to be re-energized as often.
d.
They use pipelining techniques.
 
 
nar002-1.jpg
 

 44. 

As shown in the accompanying figure, which of the following kinds of card is a circuit board that enhances functions of a component of the system unit and/or provides connections to peripherals?
a.
peripheral
c.
conversion
b.
adapter
d.
microcode
 

 45. 

Which of the following adapter cards connects to musical instruments?
a.
USB
c.
parallel
b.
serial
d.
MIDI
 

 46. 

What is the term for a motion you make on a touch screen with the tip of one or more fingers or your hand?
a.
gesture
c.
click
b.
flip
d.
flick
 

 47. 

Which of the following is a touch-sensitive display device that users interact with by touching the screen with a finger or a stylus?
a.
trackpad
c.
touchpad
b.
touch screen
d.
stylus
 

 48. 

An important measure of LCD monitors is the time in milliseconds (ms) that it takes to turn a pixel on or off. What is this called?
a.
contrast time
c.
pitch time
b.
pixel time
d.
response time
 

 49. 

Which of the following describes the difference in light intensity between the brightest white and the darkest black that can be displayed on an LCD monitor?
a.
GPU
c.
Color matrix
b.
Contrast ratio
d.
Format indicia
 
 
nar003-1.jpg
 

 50. 

A printer, such as that shown in the accompanying figure, creates images using a laser beam and powdered ink. What is this ink called?
a.
laser dust
c.
toner
b.
spoiler
d.
cracker
 

 51. 

Which of the following terms is the number of bytes (characters) a storage medium can hold?
a.
resolution
c.
capacity
b.
dimensionality
d.
retention
 

 52. 

Some computers improve hard disk access time by using which of the following, which consists of memory chips that store frequently accessed items?
a.
warehouse
c.
base
b.
disk cache
d.
home
 

 53. 

Which of the following is a type of optical disc that users can read from but not write to or erase?
a.
CD-R
c.
DVD-ROM
b.
CD-RW
d.
DVD-RW
 

 54. 

The process of copying audio and/or video data from a purchased disc and saving it on digital media is called ____.
a.
burning
c.
ripping
b.
storing
d.
grabbing
 

 55. 

Which of the following is a high-capacity optical disc on which users can read but not write or erase?
a.
DVD-RW
c.
DVD-R
b.
DVD-ROM
d.
Blu-ray
 

 56. 

Which of the following kinds of devices duplicates data, instructions, and information to improve data reliability?
a.
RAID
c.
NAS
b.
RAS
d.
RAN
 

 57. 

Which of the following kinds of devices are servers connected to a network with the sole purpose of providing storage?
a.
RAID
c.
NAS
b.
RAS
d.
RAN
 

 58. 

Which of the following does NOT use direct access?
a.
optical discs
c.
hard disks
b.
tape
d.
flash memory storage
 

 59. 

Which of the following kinds of cards stores data on an integrated circuit embedded in the card?
a.
tool
c.
view
b.
micro
d.
smart
 

 60. 

Which of the following is a small sheet of film, usually about 4 X 6 inches, that stores microscopic images of documents?
a.
Microfilm
c.
Microfiche
b.
Microtape
d.
Microsheet
 

True/False
Indicate whether the statement is true or false.
 

 1. 

Any illegal act involving a computer generally is referred to as a computer crime.
 

 2. 

If a program or device has a default password, be sure to retain it.
 

 3. 

Biometric objects are entirely foolproof.
 

 4. 

To promote a better understanding of software piracy problems and, if necessary, to take legal action, a number of major worldwide software companies formed the BSA.
 

 5. 

Many organizations and businesses have strict written policies governing the installation and use of software and enforce their rules by checking networked or online computers periodically to ensure that all software is licensed properly.
 

 6. 

The Privacy Act forbids federal agencies from allowing information to be used for a reason other than that for which it was collected.
 

 7. 

Registers are part of the memory.
 

 8. 

A petabyte is equal to approximately 1 billion bytes.
 

 9. 

Saving is the process of copying items from a storage device such as a hard disk to RAM.
 

 10. 

L2 cache is slightly faster than L1 cache but has a much smaller capacity.
 

 11. 

The access time (speed) of memory has no effect on how fast a computer processes data.
 

 12. 

The larger the number of bits handled by the bus, the slower the computer transfers data.
 

 13. 

Many batteries on computers and mobile devices can be charged only a certain number of times before they fail completely.
 

 14. 

A command is a series of related instructions that tells a computer what tasks to perform and how to perform them.
 

 15. 

Portable media players that do not have touch screens typically have a touch-sensitive pad.
 

 16. 

OCR devices read printed characters in a special font.
 

 17. 

Graphics is a category of output that includes memos, letters, announcements, press releases, and reports.
 

 18. 

Pixel pitch describes the difference in light intensity between the brightest white and the darkest black that can be displayed on an LCD monitor.
 

 19. 

Impact printers are noisy because a mechanism strikes against an inked ribbon that physically contacts the paper.
 

 20. 

Some data projectors are small portable devices.
 

 21. 

In addition to games, joysticks, wheels, and gamepads that include force feedback are used in practical applications such as in the military and aviation.
 

 22. 

When a user issues a command to run an application, the operating system locates the application in memory and loads it into storage.
 

 23. 

A hard disk’s platters may continue to spin even after power is removed from the computer.
 

 24. 

On an optical disc, a land causes light to reflect, which is read as binary digit 0.
 

 25. 

As with a hard disk, the single track on an optical disc is divided into variably sized sectors on which items are stored.
 

 26. 

Optical discs should be stored in a flat (horizontal) position.
 

 27. 

A popular use of CD-RW and CD-R discs is to create audio CDs.
 

 28. 

A level 1 configuration enhances storage reliability because, if a disk should fail, a duplicate of the requested item is available within the array of disks.
 

 29. 

Enterprises cannot implement both network attached storage and storage area networks.
 

 30. 

Because passive RFID tags contain a battery, they cannot be embedded in skin.
 

Completion
Complete each statement.
 

 1. 

A(n) ____________________ agreement is the right to use software.
 

 

 2. 

When 8 bits are grouped together as a unit, they form a(n) ____________________.
 

 

 3. 

____________________ cache is a type of cache that helps speed the processes of a computer because it stores frequently used instructions and data.
 

 

 4. 

A(n) ____________________ card converts computer output into a signal that travels through a cable to the monitor, which displays an image on the screen.
 

 

 5. 

A(n) ____________________ mouse uses devices that emit and sense light to detect the mouse’s movement.
 

 

 6. 

Of letters, spreadsheets, reports, and books, they all usually use portrait orientation except ____________________.
 

 

 7. 

To start up, a computer or mobile device locates an operating system on its storage medium and loads it into ____________________.
 

 

 8. 

Flash memory cards are a type of ____________________ media, which means they consist entirely of electronic components and contain no moving parts.
 

 

 9. 

Like SCSI, ____________________ is a hard disk interface that uses parallel signals to transfer data, instructions, and information.
 

 

 10. 

The ____________________ is a hard disk interface that can support up to eight or fifteen peripheral devices.
 

 



 
Check Your Work     Start Over