Multiple Choice Identify the
letter of the choice that best completes the statement or answers the question.
|
|
1.
|
A central processing unit also is known as a _____.
a. | computer case | c. | personal computer | b. | microprocessor | d. | program |
|
|
2.
|
ROM chips that can be reprogrammed are known as _____.
a. | firmware | c. | BIOS | b. | flash ROM | d. | DIMMs |
|
|
3.
|
The _____ is the part that loads when a computer first is turned on.
a. | shell | c. | user preference | b. | kernel | d. | OS |
|
|
4.
|
_____ is a system resource that lets an I/O device send data directly to
memory.
a. | Busing | c. | CPU bypass | b. | DMA channel | d. | Memory address |
|
|
5.
|
The _____ is a small sector at the very beginning of the hard drive.
|
|
6.
|
The CPU has a(n) _____ for communication to the internal memory cache.
a. | system bus | c. | external bus | b. | internal bus | d. | FSB |
|
|
7.
|
_____ processors generally run more slowly because it takes more steps to
accomplish a simple operation.
|
|
8.
|
All CPUs today have _____.
a. | COAST | c. | L2 cache | b. | L1 cache | d. | L3 cache |
|
|
9.
|
The amount of memory a computer can hold is determined by the number of _____ on
the motherboard.
a. | bays | c. | expansion slots | b. | memory slots | d. | sockets |
|
|
10.
|
The file system defines the size of the _____ used to store data on the hard
disk.
a. | units | c. | sectors | b. | tracks | d. | clusters |
|
|
11.
|
A serial port on the back of a computer can be identified by _____.
a. | searching for the interface standard label | b. | looking for the
special chip | c. | counting the pins | d. | looking for unused
pins |
|
|
12.
|
The _____ is the layer between the OS and the hardware.
a. | Executive services | c. | Win32 security | b. | HAL | d. | object manager |
|
|
13.
|
With Windows XP, you can schedule a backup using the _____ utility.
a. | Automated System Recovery | c. | Manage Media | b. | Backup | d. | Restore Media |
|
|
14.
|
A _____ is a small program contained in a document that automatically can be
executed when the document first is loaded, or later by pressing a key combination.
a. | virus | c. | strain | b. | payload | d. | macro |
|
|
15.
|
Antivirus software detects a known virus by looking for distinguishing
characteristics called a(n) _____.
a. | malicious code | c. | incubation period | b. | macro | d. | virus signature |
|
True/False Indicate whether the
sentence or statement is true or false.
|
|
16.
|
A jumper acts as a switch that closes or opens electrical circuits.
|
|
17.
|
A GUI provides menus as a way to enter data and commands.
|
|
18.
|
An average speed for a new CPU today is about 4.77 MHz.
|
|
19.
|
Some CPUs can receive more bits than they can process at one time.
|
|
20.
|
All CPUs use a single-voltage design, in which the same voltage is used for
external and internal operations.
|
|
21.
|
Chips on the motherboard require power to function.
|
|
22.
|
The USB is a very fast local bus used for digital cameras and scanners.
|
|
23.
|
The most widely used IDE interface standard today is Ultra ATA/66.
|
|
24.
|
To output information, a computer performs analog-to-digital conversion.
|
|
25.
|
Serial ports most commonly are used by printers.
|
|
26.
|
PCI expansion slots typically are used to connect a video card that provides a
port for the monitor.
|
|
27.
|
Every domain has at least one server set up as the domain controller.
|
|
28.
|
Users are permitted to install the software on a network under most end-user
license agreements.
|
|
29.
|
Any file placed in an encrypted folder automatically is encrypted.
|
|
30.
|
The Registry Editor has a look and feel similar to Windows Explorer.
|
Completion Complete each
sentence or statement.
|
|
31.
|
A(n) _________________________ is a pair of prongs that are electrical contact
points set into the computer motherboard or an adapter card.
|
|
32.
|
The process of preparing a disk for reading and writing by defining how files
will be organized on it is called _________________________.
|
|
33.
|
Some hardware devices, such as a joystick, use _________________________ as a
way to communicate with the CPU.
|
|
34.
|
A floppy disk with enough software to load an operating system is called a(n)
_________________________.
|
|
|
|
|
35.
|
In the accompanying figure, the chip shown is using _________________________,
in which the L2 cache is on a separate die from the processor.
|
|
36.
|
The _________________________ is a metal plate that comes with the motherboard
and fits over the ports.
|
|
37.
|
_________________________ memory can detect and correct an error in one bit of
the byte.
|
|
38.
|
Windows virtual memory manager can choose to store pages assigned to an
application or device driver that needs memory in the swap file named
_________________________.
|
|
39.
|
For DIMMs, ads list the _________________________ of the module, which is
written as two numbers separated by x.
|
|
40.
|
_________________________ refers to the number of clock cycles it takes to write
a row of data to or from memory.
|
|
41.
|
_________________________ is a slow method of transferring data that involves
the CPU.
|
|
42.
|
A parallel port sometimes is referred to as a(n) _________________________,
which indicates that it has 25 pins on the connector.
|
|
43.
|
A popular way to add peripheral devices to a notebook is to use a(n)
_________________________.
|
|
44.
|
A(n) _________________________ is a device that can be connected to a network
and is accessible to a computer by way of a network.
|
|
45.
|
_________________________ are items consumed by the printer, such as paper, ink
ribbons, color sticks, toner cartridges, and ink cartridges.
|
|
46.
|
The _________________________ is a section of the Microsoft Web site that lists
products that are compatible with Windows XP.
|
|
47.
|
A(n) _________________________ includes conditions that specify a user’s
responsibility upon acceptance of the agreement.
|
|
48.
|
Applications at the top of the Start menu are said to be
_________________________ to the menu.
|
|
49.
|
Any changes made to a(n) _________________________ are specific to the computer
on which the changes have been made.
|
|
50.
|
For a stand-alone computer or a computer in the workgroup,
_________________________ should be used to implement Group Policy settings.
|