Management

Topics: Personal computer, Computer, Operating system Pages: 20 (2133 words) Published: May 25, 2014
Review Test Submission: MID-SEMESTER/INTERIM ASSESSMENT
Content
User
KING DUHO
Course
INTRO TO COMPUTERS
Test
MID-SEMESTER/INTERIM ASSESSMENT
Started
4/15/14 11:47 AM
Submitted
4/15/14 12:45 PM
Status
Completed
Attempt Score
92 out of 100 points  
Time Elapsed
58 minutes out of 1 hour
Instructions

Question 1
2 out of 2 points

Files maintained by the Macintosh operating system can have two parts, called ____.

Selected Answer:

forks
Answers:
components

segments

forks

identifier and size

Question 2
0 out of 2 points

With PGP, you send the private key to ____.

Selected Answer:

people whom you have authorized to send you encrypted messages Answers:
people whom you have authorized to send you plaintext messages

people whom you have authorized to send you encrypted messages

anyone with whom you expect to have e-mail correspondence

no one

Question 3
2 out of 2 points

Most wireless networks transport data as ____ signals.

Selected Answer:

RF (radio frequency)
Answers:
infrared

satellite

microwave

RF (radio frequency)

Question 4
2 out of 2 points

____ queries are questions stated in a language such as English, rather than an esoteric query language.

Selected Answer:

Natural language
Answers:

Natural language

Keyword

QBE

Notational

Question 5
2 out of 2 points

High-bandwidth communications systems are sometimes referred to as ____.

Selected Answer:

broadband
Answers:
quickband

broadband

fireband

Internet 2

Question 6
2 out of 2 points

Product activation can create a ____ based on your validation code and your computer’s internal serial number.

Selected Answer:

hash value
Answers:
Trojan horse

blueprint

hash value

hash brown

Question 7
2 out of 2 points

____ is used to enhance processor performance.

Selected Answer:

both a and c
Answers:
Pipelining

A benchmark

Parallel processing

both a and c

Question 8
2 out of 2 points

The accompanying figure represents two types of chip carriers. The one on the left is a ____.

Selected Answer:

DIP
Answers:
PGA

DIP

PID

GAP

Question 9
2 out of 2 points

The ____ from an instruction specifies the data.

Selected Answer:

operand
Answers:
op code

operand

ALU

instruction code

Question 10
2 out of 2 points

If a program exceeds its allocated space, the operating system uses an area of the hard disk called ____ to store parts of a program or data file until they are needed.

Selected Answer:

virtual memory
Answers:
volatile memory

capacitor memory

virtual memory

integrated memory

Question 11
2 out of 2 points

Many of today’s microprocessors perform ____, in which multiple instructions are executed at the same time.

Selected Answer:

parallel processing
Answers:
serial processing

multitasking

parallel processing

benchmarking

Question 12
0 out of 2 points

Case-Based Critical Thinking Questions
Case 3-3

At the ACME Widget Company, the computers have started behaving weirdly. Chris noticed that his directory had some files that he didn’t remember putting on his computer. Lesley noticed her computer was beginning to run very slowly, and Kim realized she was getting replies to emails she had not sent. The owner of the ACME Widget Company has contacted you to see if their company might have a computer security problem.

Another possibility is that ACME Widget Company has a ____ that seems to perform one function while actually doing something else.

Selected Answer:

worm
Answers:
virus

worm

Trojan horse

bot

Question 13
2 out of 2 points

The...
Continue Reading

Please join StudyMode to read the full document

You May Also Find These Documents Helpful

  • Essay on Strategic Management
  • Essay on Management
  • operations management Essay
  • Management Essay
  • Memory Management Essay
  • Management Essay
  • Management Essay
  • Healthcare Management Essay

Become a StudyMode Member

Sign Up - It's Free