

Computers and Society Practice Exam
Course Introduction
This course explores the multifaceted relationship between computers, technology, and society, examining how computing has transformed various aspects of human life. Topics include the historical development of computers, the ethical, legal, and social implications of technology, privacy and security concerns, digital divide and accessibility issues, and the impact of emerging technologies such as artificial intelligence and big data. Through case studies, class discussions, and research projects, students will critically assess the responsibilities of computer professionals and the broader societal consequences of technological advancement.
Recommended Textbook
New Perspectives on Computer Concepts 2014 Comprehensive 17th Edition by June Jamrich Parsons
Available Study Resources on Quizplus
12 Chapters
1795 Verified Questions
1795 Flashcards
Source URL: https://quizplus.com/study-set/942

Page 2

Chapter 1: Computers and Digital Basics
Available Study Resources on Quizplus for this Chatper
147 Verified Questions
147 Flashcards
Source URL: https://quizplus.com/quiz/18552
Sample Questions
Q1) The accompanying figure represents two types of chip carriers.The one on the left is a ____.
A) PGA
B) DIP
C) PID
D) GAP
Answer: B
Q2) Prior to 1940,the word computer was defined as a person who performs calculations.
A)True
B)False
Answer: True
Q3) You should always use a different password for every account.
A)True
B)False
Answer: False
Q4) In the accompanying figure,box A indicates a type of wave,such as a sound wave,known as a(n)____________________ wave.
Answer: analog
To view all questions and flashcards with answers, click on the resource link above.
Page 3

Chapter 2: Computer Hardware
Available Study Resources on Quizplus for this Chatper
150 Verified Questions
150 Flashcards
Source URL: https://quizplus.com/quiz/18553
Sample Questions
Q1) A good computer maintenance routine would include regularly ____.
A) running utilities like Disk Cleanup and Disk Defragmenter
B) scanning your computer for viruses and spyware
C) deleting your browser's history and cache files
D) all of the above
Answer: D
Q2) ____ refers to the number of bits that a microprocessor can manipulate at one time.
A) Processor speed
B) Word size
C) Register space
D) ALU
Answer: B
Q3) A RISC processor has complex instruction sets,each requiring several clock cycles for execution.
A)True
B)False
Answer: False
To view all questions and flashcards with answers, click on the resource link above.
4

Chapter 3: Software
Available Study Resources on Quizplus for this Chatper
149 Verified Questions
149 Flashcards
Source URL: https://quizplus.com/quiz/18554
Sample Questions
Q1) DVD authoring software offers tools for creating DVDs with ____-style menus.
A) London
B) New York
C) Cannes
D) Hollywood Answer: C
Q2) <u>Stereographical</u> applications typically display satellite,aerial,or street maps used to locate places and get directions between two addresses._________________________
A)True
B)False
Answer: False
Q3) The intersection of a column and a row on a spreadsheet is called a ____.
A) formula
B) value
C) number
D) cell
Answer: D
Q4) A(n)____________________ address is one that is misleading or incorrect. Answer: spoofed
To view all questions and flashcards with answers, click on the resource link above. Page 5

Chapter 4: Operating Systems and File Management
Available Study Resources on Quizplus for this Chatper
150 Verified Questions
150 Flashcards
Source URL: https://quizplus.com/quiz/18555
Sample Questions
Q1) Activities associated with resource management by an operating system include all of the following EXCEPT ____.
A) managing processor resources
B) ensuring that input and output proceed in an orderly manner
C) keeping track of storage resources
D) installing new memory
Q2) A computer file's location is defined by a ____.
A) file name
B) file specification
C) file extension
D) file folder
Q3) Files maintained by the Macintosh operating system can have two parts,called
A) components
B) segments
C) forks
D) identifier and size
Q4) A named collection of data that exists on a storage medium is a computer
Q5) A list of files contained on a storage disk is called a(n)____________________.
To view all questions and flashcards with answers, click on the resource link above. Page 6

Chapter 5: Local Area Networks
Available Study Resources on Quizplus for this Chatper
150 Verified Questions
150 Flashcards
Source URL: https://quizplus.com/quiz/18556
Sample Questions
Q1) In a wireless ____ network,devices broadcast directly to each other.
A) ad-hoc
B) infrastructure
C) embedded
D) SSID
Q2) A(n)____________________ is a connection point on a network.
Q3) In areas where there are overlapping wireless networks,such as in a city or on a college campus,____ help you log in to the right network,rather than a network run by a hacker who will try to suck important information off your computer as soon as you connect.
A) topographical maps
B) routers
C) ISPs
D) SSIDs
Q4) The best-known communications protocol is probably <u>SMTP</u>,which regulates Internet data transport._________________________
A)True
B)False
Q5) Most wireless networks transport data using ____________________ signals.
Page 7
Q6) ____________________ encryption is loosely defined as "very difficult to break."
To view all questions and flashcards with answers, click on the resource link above.

Chapter 6: The Internet
Available Study Resources on Quizplus for this Chatper
149 Verified Questions
149 Flashcards
Source URL: https://quizplus.com/quiz/18557
Sample Questions
Q1) Sometimes Sally wants to browse the Internet while sitting and enjoying a cup of coffee.She has heard that there are some public WiFi options but she knows there are some limitations.You tell her ____.
A) they are very expensive
B) access speed is slow
C) wireless eavesdroppers can access personal info
D) all of the above
Q2) DNS cache ____ has been used by governments to keep citizens away from Web sites that supply politically or culturally inflammatory information.
A) diversion
B) rerouting
C) poisoning
D) distraction
Q3) Most Internet servers have an easy to remember name that is known as a(n)____.
A) top-level name
B) ISP
C) FQDN
D) NAP name
Q4) Explain what VoIP is and how it works.
To view all questions and flashcards with answers, click on the resource link above. Page 8

Chapter 7: The Web and E-mail
Available Study Resources on Quizplus for this Chatper
150 Verified Questions
150 Flashcards
Source URL: https://quizplus.com/quiz/18558
Sample Questions
Q1) In a classic Webmail configuration,messages are sent immediately and thus a(n)____ is not needed.
A) server
B) client
C) Inbox
D) Outbox
Q2) What are the pros and cons of Webmail?
Q3) The framework for an HTML document consists of two sections: a head and a body.
A)True
B)False
Q4) HTTP provides a secure connection for Web-based transactions.
A)True
B)False
Q5) The term player is sometimes used to refer to plug-ins,but it also can refer to standalone software that does not require a host program.
A)True
B)False
Q6) Web ____________________ software provides tools specifically designed to enter and format Web page text,graphics,and links.
Page 9
To view all questions and flashcards with answers, click on the resource link above.

Chapter 8: Digital Media
Available Study Resources on Quizplus for this Chatper
150 Verified Questions
150 Flashcards
Source URL: https://quizplus.com/quiz/18559
Sample Questions
Q1) A scanner,like the one featured in the accompanying figure,creates a vector graphic.
A)True
B)False
Q2) Individual objects in a vector graphic,like the one in the accompanying figure,cannot be easily stretched,shrunk,colored,moved,and deleted.
A)True
B)False
Q3) The process of covering a wireframe with surface color and texture is called ____. A) rendering B) dithering
C) rasterizing
D) resolution
Q4) Solid state storage cards hold data without consuming power,so they do not lose data when the camera,for example,is turned off.
A)True
B)False
Q5) ____________________ is a graphics format designed to improve on the GIF format.
To view all questions and flashcards with answers, click on the resource link above. Page 10
Chapter 9: The Computer Industry: History,Careers,and Ethics
Available Study Resources on Quizplus for this Chatper
150 Verified Questions
150 Flashcards
Source URL: https://quizplus.com/quiz/18560
Sample Questions
Q1) A(n)____________________ tool is a software program that performs broad-based Web searches,such as searching more than one job database at a time.
Q2) Computer hardware and software are sold through outlets called marketing ____________________.
Q3) After Microsoft's share of the total personal computer operating system market,the remaining share is taken up by ____.
A) Apple
B) several Linux vendors
C) DEC
D) both a and b
Q4) The U.S.Census Bureau held a competition to find a way to tabulate the 1890 census.The Hollerith Tabulating Machine won.The company is now known as ____.
A) HP
B) HTM
C) IBM
D) HAL
Q5) Workers using technology to work from home or an off-site location are

To view all questions and flashcards with answers, click on the resource link above.

Chapter 10: Information Systems Analysis and Design
Available Study Resources on Quizplus for this Chatper
150 Verified Questions
150 Flashcards
Source URL: https://quizplus.com/quiz/18561
Sample Questions
Q1) The three key concepts that ensure good quality of service from a computer system include all of the following EXCEPT ____.
A) reliability
B) cost
C) availability
D) serviceability
Q2) As a low-level manager at your company,you are responsible for activities that make the day-to-day operation of the business run smoothly,like ordering office supplies and creating work schedules.This is called ____.
A) operational planning
B) tactical planning
C) strategic planning
D) analysis
Q3) A(n)____________________ usually includes data from an organization's transaction processing system,and it might include or access external data,such as stock market reports.
Q4) A(n)____________________ is a place where software testing can occur without disrupting the organization's regular information system.
To view all questions and flashcards with answers, click on the resource link above.
Page 12
Chapter 11: Databases
Available Study Resources on Quizplus for this Chatper
150 Verified Questions
150 Flashcards
Source URL: https://quizplus.com/quiz/18562
Sample Questions
Q1) Explain five things you can do to minimize your personal data's vulnerability to database security breaches.
Q2) The average American is in less than 10 commercial databases.
A)True
B)False
Q3) In the accompanying figure,the relationship shown in the top row is a one-to-many relationship.
A)True
B)False
Q4) Databases are vulnerable to ____.
A) theft
B) hacking
C) unauthorized access
D) All of the above
Q5) An index has no bearing on the physical sequence of records on disk.
A)True
B)False
Q6) The logical data type is used for true/false or yes/no data.
A)True
B)False

Page 13
To view all questions and flashcards with answers, click on the resource link above.

Chapter 12: Computer Programming
Available Study Resources on Quizplus for this Chatper
150 Verified Questions
150 Flashcards
Source URL: https://quizplus.com/quiz/18563
Sample Questions
Q1) Algorithms are usually written in a format specific to the language to be used.
A)True
B)False
Q2) Can be accessed only by the routine in which it is defined
A)known information
B)walkthrough
C)procedure
D)private attribute
E)IDE
F)buffer overflow
G)UML
H)API
I)object
J)sequential
K)event
L)signed code
Q3) A class can produce any number of unique objects.
A)True
B)False
Q4) In Prolog,finding a value for a variable is referred to as ____________________.
To view all questions and flashcards with answers, click on the resource link above. Page 14