

Computers and Society Pre-Test Questions
Course Introduction
This course explores the complex interactions between computing technologies and society, examining how computers shape and are shaped by social, ethical, legal, and economic forces. Topics include privacy, security, intellectual property, digital divides, social media, and the impact of technological advances on work, communication, and culture. Through case studies, discussions, and critical analysis, students will develop an understanding of the responsibilities of computing professionals and the broader implications of technology-driven change in contemporary society.
Recommended Textbook
New Perspectives on Computer Concepts 2013 Comprehensive 15th Edition by June Jamrich Parsons
Available Study Resources on Quizplus
12 Chapters
1795 Verified Questions
1795 Flashcards
Source URL: https://quizplus.com/study-set/1723

Page 2

Chapter 1: Computers and Digital Basics
Available Study Resources on Quizplus for this Chatper
147 Verified Questions
147 Flashcards
Source URL: https://quizplus.com/quiz/34239
Sample Questions
Q1) The accompanying figure represents the instruction cycle.The third step is Box C and represents the ____.
A) fetch instruction
B) interpret instruction
C) execute instruction
D) increment pointer
Answer: C
Q2) A super-thin slice of semiconducting material packed with microscopic circuit elements is a(n)____.
A) integrated circuit
B) computer chip
C) microchip
D) all of the above
Answer: D
Q3) A problem a hacker can cause after breaking into your computer might be ____.
A) applying for credit in your name
B) sending embarrassing e-mails
C) applying for a mortgage using your data
D) all of the above
Answer: D
To view all questions and flashcards with answers, click on the resource link above. Page 3

Chapter 2: Computer Hardware
Available Study Resources on Quizplus for this Chatper
150 Verified Questions
150 Flashcards
Source URL: https://quizplus.com/quiz/34240
Sample Questions
Q1) You can usually identify the microprocessor when looking inside a computer,as it is the only chip on the motherboard.
A)True
B)False
Answer: False
Q2) What is the best storage medium for storing James' three databases,each of which is approximately 500 MB?
A) CD-R
B) USB flash drive
C) DVD-ROM
D) Internal hard disk
Answer: B
Q3) On which of the following devices do Windows Phone apps run?
A) iPhones
B) Palm
C) BlackBerry
D) none of the above
Answer: D
To view all questions and flashcards with answers, click on the resource link above. Page 4

Chapter 3: Software
Available Study Resources on Quizplus for this Chatper
149 Verified Questions
149 Flashcards
Source URL: https://quizplus.com/quiz/34241
Sample Questions
Q1) In the accompanying figure,the index card represents a single database ____.
A) data
B) field
C) record
D) item
Answer: C
Q2) Tom will be the only person using the license,so he needs a ____ license.
A) site
B) multiple-user
C) concurrent user
D) single-user
Answer: D
Q3) If you want tools that allow you to record,edit,and mix digital audio,you can turn to ____________________ software.
Answer: audio editing
audio-editing recording mixing audioediting
To view all questions and flashcards with answers, click on the resource link above.
Page 5

Chapter 4: Operating Systems and File Management
Available Study Resources on Quizplus for this Chatper
150 Verified Questions
150 Flashcards
Source URL: https://quizplus.com/quiz/34242
Sample Questions
Q1) A ____ displays the options associated with a command.
A) submenu
B) dialog box
C) menu selection
D) all of the above
Q2) In relation to disks,____ is a recording technology that lets you record in multiple sessions.
A) master writing
B) packet writing
C) disk mastering
D) packet mastering
Q3) The operating system that was developed in 1969 by AT&T's Bell Labs and gained a good reputation for its dependability is ____.
A) INIX
B) UNIX
C) LINUX
D) LUNIX
Q4) A list of files contained on a storage disk is called a(n)____________________.
Q5) One example of a file management utility is Windows ____________________.
Page 6
Q6) List and describe the events that take place during the boot process.
To view all questions and flashcards with answers, click on the resource link above.

Chapter 5: Local Area Networks
Available Study Resources on Quizplus for this Chatper
150 Verified Questions
150 Flashcards
Source URL: https://quizplus.com/quiz/34243
Sample Questions
Q1) An encrypted message is referred to as ____.
A) keytext
B) strong text
C) ciphertext
D) plaintext
Q2) A ____ server is a computer whose primary purpose is to be a repository for files that can be accessed by network workstations.
A) file
B) print
C) document
D) backup
Q3) A storage device that directly connects to a network is called network peripheral storage._________________________
A)True
B)False
Q4) A(n)____________________ is a collection of trusted Windows computers that automatically share files and folders.
Q5) What are microwaves and how do they transport data?
Q6) ____________________ encryption is loosely defined as "very difficult to break."
To view all questions and flashcards with answers, click on the resource link above. Page 7

Chapter 6: The Internet
Available Study Resources on Quizplus for this Chatper
149 Verified Questions
149 Flashcards
Source URL: https://quizplus.com/quiz/34244
Sample Questions
Q1) The accompanying figure represents the connection of your computer to the Internet; the router marked A should belong to a(n)____.
A) ISP
B) NSP
C) end user
D) none of the above
Q2) Most Internet servers have an easy to remember name that is known as a(n)____.
A) domain address
B) ISP
C) FQDN
D) NAP address
Q3) The accompanying figure represents a virtual private network.In this figure,B points to a(n)____.
A) corporate network
B) remote access server
C) router
D) ISP
Q4) Cell phones that offer Wi-Fi are not capable of making VoIP calls.
A)True
B)False
To view all questions and flashcards with answers, click on the resource link above. Page 8

Chapter 7: The Web and E-Mail
Available Study Resources on Quizplus for this Chatper
150 Verified Questions
150 Flashcards
Source URL: https://quizplus.com/quiz/34245
Sample Questions
Q1) When working with ____ mail,make sure your antivirus software is checking incoming messages.
A) MIME
B) HTML
C) ASCII
D) RTF
Q2) Give two reasons why it is important to upgrade your browser when a new version becomes available.
Q3) Webmail allows you to use a(n)____ to access and view your e-mail messages.
A) operating system
B) server
C) browser
D) crawler
Q4) A(n)____ certificate is an electronic attachment to a file that verifies the identity of its source.
A) authentication
B) digital
C) analog
D) authority
Q5) What are the advantages of local e-mail?
Page 9
To view all questions and flashcards with answers, click on the resource link above.

Chapter 8: Digital Media
Available Study Resources on Quizplus for this Chatper
150 Verified Questions
150 Flashcards
Source URL: https://quizplus.com/quiz/34246
Sample Questions
Q1) A vector graphic,like the one shown in the accompanying figure,resizes better than a comparable bitmap graphic.
A)True
B)False
Q2) Nancy is using codec software to reduce the size of some of her video files by allowing her to specify a compression ratio or bitrate.If she is very concerned with minimizing the size of her video files,she could ____.
A) use a high bitrate
B) use a high compression ratio
C) increase the frame rate
D) increase the frame size
Q3) ____________________ is the industry-standard container format for standalone DVD players.
Q4) Using a computer's infrared port to beam photo data from a camera,which eliminates the need for a cable,is much faster than using FireWire or USB._________________________
A)True
B)False
Q5) Describe the TIFF and JPEG bitmap graphic formats.
To view all questions and flashcards with answers, click on the resource link above. Page 10

Chapter 9: The Computer Industry: History, careers, and Ethics
Available Study Resources on Quizplus for this Chatper
150 Verified Questions
150 Flashcards
Source URL: https://quizplus.com/quiz/34247
Sample Questions
Q1) It is less expensive to replace software with brand new software than to purchase an upgrade.
A)True
B)False
Q2) The ____ Act establishes an agency to monitor threats to the communication infrastructure.
A) Homeland Security
B) Electronic Communications Privacy
C) USA Patriot
D) Computer Fraud and Abuse
Q3) A ____ combines commercially available products with specialty hardware or software.
A) manufacturer direct
B) mail order firm
C) VAR
D) All of the above
Q4) The use of components or labor from outside suppliers is called
Q6) Discuss how to go about making ethical decisions. Page 11
Q5) The study of safe and efficient working environments is
To view all questions and flashcards with answers, click on the resource link above. Page 12

Chapter 10: Information Systems Analysis and Design
Available Study Resources on Quizplus for this Chatper
150 Verified Questions
150 Flashcards
Source URL: https://quizplus.com/quiz/34248
Sample Questions
Q1) Which of the following is TRUE with regard to turnkey systems?
A) They require maximum effort to select and set up equipment and software.
B) They require time and expertise to evaluate.
C) They require more time than programming languages.
D) They can be exactly tailored to meet system requirements.
Q2) In the accompanying figure,the Student item represents a data store.
A)True
B)False
Q3) Many organizations establish a ____ to handle end-user problems.
A) user desk
B) help desk
C) system desk
D) processing desk
Q4) An enterprise-wide disaster recovery plan should do all of the following EXCEPT
A) minimize immediate damage and prevent additional losses
B) ensure the safety of people on the premises
C) temporarily suspend critical business operations
D) facilitate effective coordination of recovery tasks
Q5) The items in the accompanying figure are symbols from a(n)____________________.
To view all questions and flashcards with answers, click on the resource link above. Page 13

Chapter 11: Databases
Available Study Resources on Quizplus for this Chatper
150 Verified Questions
150 Flashcards
Source URL: https://quizplus.com/quiz/34249
Sample Questions
Q1) A lookup ____________________ validates an entry by searching for the same data in a file or database table.
Q2) Although encryption cannot prevent a database from being lost or stolen,it can make the data it contains unintelligible to a hacker._________________________
A)True
B)False
Q3) The ____ operator specifies that both of the search criteria must be true for the record to be selected.
A) ALL
B) NONE
C) NOT
D) AND
Q4) The average American is in less than 10 commercial databases.
A)True
B)False
Q5) ____________________ Web publishing is a process that generates customized Web pages as needed,or "on the fly."
Q6) Describe the seven principles that contribute to good user interface design.
To view all questions and flashcards with answers, click on the resource link above. Page 14

Chapter 12: Computer Programming
Available Study Resources on Quizplus for this Chatper
150 Verified Questions
150 Flashcards
Source URL: https://quizplus.com/quiz/34250
Sample Questions
Q1) A word with a predefined meaning for the compiler or interpreter is a(n)____________________.
Q2) Polymorphism allows for information hiding.
A)True
B)False
Q3) The ____ paradigm focuses on an algorithm that describes a solution.
A) functional
B) declarative
C) procedural
D) object-oriented
Q4) Signed certificates assure users that the original software is free of viruses and bugs.
A)True
B)False
Q5) One type of control structure is directing.
A)True
B)False
Q6) A(n)____________________ represents a value that can change.
Q7) A(n)____________________ is any class that inherits attributes from a superclass.
Page 15
To view all questions and flashcards with answers, click on the resource link above.