

Computing Concepts
Exam Practice Tests
Course Introduction
Computing Concepts provides an introduction to the fundamental principles of computer science and information technology. This course covers essential topics such as algorithms, data structures, hardware and software components, operating systems, and networking basics. Students will explore how computers process information, the basics of programming logic, problem-solving strategies, and ethical considerations in computing. The course lays the groundwork for further study in computer science and helps students develop computational thinking skills applicable across various disciplines.
Recommended Textbook
New Perspectives on Computer Concepts 2016 Comprehensive 18th Edition by June Jamrich Parsons
Available Study Resources on Quizplus
12 Chapters
1289 Verified Questions
1289 Flashcards
Source URL: https://quizplus.com/study-set/1911 Page 2


Chapter 1: Digital Content
Available Study Resources on Quizplus for this Chatper
98 Verified Questions
98 Flashcards
Source URL: https://quizplus.com/quiz/38087
Sample Questions
Q1) ASCII requires __________ bits for each character.
A)two
B)six
C)seven
D)ten
Answer: C
Q2) When 4:3 videos are displayed in a widescreen player, they are bordered by the black bars of a(n) _______.
Answer: letterbox
Q3) _______ compression can be applied to each frame of a video.
Answer: Intraframe
Q4) Character data is composed of letters, symbols, and numerals that are used in calculations.
A)True
B)False
Answer: False
Q5) Data ____________ refers to any technique that recodes the data in a file so that it contains fewer bits.
Answer: compression
To view all questions and flashcards with answers, click on the resource link above. Page 3

Chapter 2: Digital Devices
Available Study Resources on Quizplus for this Chatper
119 Verified Questions
119 Flashcards
Source URL: https://quizplus.com/quiz/38088
Sample Questions
Q1) Many touchscreens have an _________ coating designed to repel the oils deposited by fingertips.
Answer: oleophobic
Q2) What type of computer should you consider purchasing if you want a portable system that is great for consuming content?such as ebooks, music, and videos but not so great for creating content or multitasking?
A)Tablet
B)Smartphone
C)Desktop
D)Laptop
Answer: A
Q3) Which of the following is NOT an example of an expansion port?
A)Thunderbolt
B)USB 3.0
C)HDMI
D)RAM
Answer: D
Q4) The ALU uses __________ to hold data that is being processed. Answer: registers
To view all questions and flashcards with answers, click on the resource link above. Page 4

Chapter 3: Networks
Available Study Resources on Quizplus for this Chatper
100 Verified Questions
100 Flashcards
Source URL: https://quizplus.com/quiz/38089
Sample Questions
Q1) On a network, which protocol is responsible for dividing files into chunks, adding headers containing information for reassembling packets in their original order, and error checking?
A)UDP
B)IP
C)TCP
D)FTP
Answer: C
Q2) A Wi-Fi ______ is a wireless local area network that provides Internet access to the public.
Answer: hotspot
Q3) Two devices on a network negotiate their communication protocols through a process called ___________.
Answer: handshaking
Q4) Which of the following is an advantage of wired connection?
A)more secure
B)more dependable
C)faster speeds
D)all of the above
Answer: D
To view all questions and flashcards with answers, click on the resource link above. Page 5

Chapter 4: The Web
Available Study Resources on Quizplus for this Chatper
99 Verified Questions
99 Flashcards
Source URL: https://quizplus.com/quiz/38090
Sample Questions
Q1) What does the HTML tag <p> designate in an HTML document?
A)new paragraph
B)personal data
C)print command
D)show photos
Q2) It is a good idea to ________ your browser when a new version becomes available, mainly to increase security.
Q3) An HTML document consists of three sections: the head, Â the body, and the content.
A)True
B)False
Q4) If you wanted to set the text in a section of your HTML document to italics, what tag would you use?
A)<italic>
B)<i>
C)<it>
D)none of the above
Q5) An HTML document is sometimes referred to as a _______ document.
Q6) Besides a URL, and a set of Web pages, what else do you need for getting a Web site up and running?
Page 6
To view all questions and flashcards with answers, click on the resource link above.

Chapter 5: Social Media
Available Study Resources on Quizplus for this Chatper
101 Verified Questions
101 Flashcards
Source URL: https://quizplus.com/quiz/38091
Sample Questions
Q1) Formal __________ standards make it possible to create generalized media search engines that can locate media from multiple locations.
Q2) A person's presence on a social media service is referred to as a(n) _________.
A)online identity
B)persona
C)avatar
D)all of the above
Q3) Geocoding is the process of adding location data to photos, Web sites, HTML documents, audio files, blog posts, and text messages.
A)True
B)False
Q4) Using the Internet to deliberately harm or harass someone is called ____________.
Q5) Which popular social media service is good for sharing media and information?
A)Social networking
B)Geosocial networking
C)Content Community
D)Online Communication
Q6) Blogs and their interconnections are referred to as the ____________.
To view all questions and flashcards with answers, click on the resource link above. Page 7

Chapter 6: Software
Available Study Resources on Quizplus for this Chatper
116 Verified Questions
116 Flashcards
Source URL: https://quizplus.com/quiz/38092
Sample Questions
Q1) In a database, a(n) _________ holds data for a single entity.
Q2) Partitions are created, modified, and deleted using Filezilla on Macs and Disk Partitioner on PCs.
A)True
B)False
Q3) A local application is installed on a computer's hard disk.
A)True
B)False
Q4) Once loaded into RAM, the __________ provides essential operating system services, such as memory management and file access.
Q5) An operating system's  ____________ capability supports a division of labor among all the processing units.
A)multithreading
B)multiprocessing
C)multitasking
D)All of the above
Q6) System ___________ specify the operating system and minimum hardware capacities necessary for a software product to work correctly.
Q7) On Windows systems, the main executable file has a(n) ________ extension.
To view all questions and flashcards with answers, click on the resource link above. Page 8

Chapter 7: Digital Security
Available Study Resources on Quizplus for this Chatper
106 Verified Questions
106 Flashcards
Source URL: https://quizplus.com/quiz/38093
Sample Questions
Q1) Conventional wisdom tells us that strong passwords are at least _____ characters in length and include one or more uppercase letters, numbers, and symbols.
Q2) There are various encryption methods, but __________ is the encryption standard currently used worldwide.
A)AES
B)DDoS
C)IMSI
D)TLS
Q3) Heuristics may produce false positives that mistakenly identify a legitimate file as malware.
A)True
B)False
Q4) If you want to store passwords on your digital device, make sure to _________ the file in which they are stored.
Q5) Which type of device is the top target for ransomware?
A)Desktops
B)Laptops
C)Smartphones
D)All of the above
To view all questions and flashcards with answers, click on the resource link above. Page 9

Chapter 8: The IT Industry
Available Study Resources on Quizplus for this Chatper
117 Verified Questions
117 Flashcards
Source URL: https://quizplus.com/quiz/38094
Sample Questions
Q1) ____________ reduces the cost of goods and services by using workers and manufacturing facilities in countries with inexpensive labor.
Q2) ICT use in emerging nations lags behind its use in developed nations.
A)True
B)False
Q3) A(n) ____________ Â administrator plans, installs, and maintains one or more local area networks and may also manage cloud resources.
Q4) A(n) ___________ is any person or company that transports goods, passengers, or electronic signals over regular routes at set rates.
Q5) A key feature of the Apple Lisa was its use of _______________.
A)vacuum tubes
B)graphical user interface
C)transistors
D)VisiCalc
Q6) The 2002 Sarbanes-Oxley Act is meant to offer protection to whistleblowers.
A)True
B)False
Q7) 1996 was the year that cable _______ service made its debut.
Q8) Second-generation computers used ________ instead of vacuum tubes.
To view all questions and flashcards with answers, click on the resource link above. Page 10

Chapter 9: Enterprise Computing
Available Study Resources on Quizplus for this Chatper
121 Verified Questions
121 Flashcards
Source URL: https://quizplus.com/quiz/38095
Sample Questions
Q1) JAD provides a structured methodology for planning and holding a series of meetings in which users and analysts jointly identify problems and look for solutions.
A)True
B)False
Q2) Iterative SDLCs are often referred to as "______ methods" because they allow flexibility as development progresses.
Q3) Once you've released data to an information system, you still have have control of its distribution or its security.
A)True
B)False
Q4) ____________ testing is the process of trying out various sequences of input values and checking the results to verify that the application works as it was designed.
Q5) Systems analysis and design is a discipline that focuses on developing information systems according to the phases of an _________.
Q6) A(n) ______________ rating of 150,000 hours means that, on average, a device could function for 150,000 hours before failing.
To view all questions and flashcards with answers, click on the resource link above.
11

Chapter 10: Data Management
Available Study Resources on Quizplus for this Chatper
102 Verified Questions
102 Flashcards
Source URL: https://quizplus.com/quiz/38096
Sample Questions
Q1) Relational databases are organized according to a(n) _________, which is simply the blueprint for its structure.
Q2) A(n) __________ file consists of a single, two-dimensional table of data elements.
Q3) A table's physical sort order is the order in which records are arranged on storage devices.
A)True
B)False
Q4) A database ____________ contains a list of keys, and each key provides a pointer to the record that contains the rest of the fields related to that key.
Q5) In a key-value database, each data item has a key that is a unique identifier similar to a relational database key
A)True
B)False
Q6) From a database user perspective, the data type determines the way data can be manipulated.
A)True
B)False
To view all questions and flashcards with answers, click on the resource link above.
Page 12

Chapter 11: Programming
Available Study Resources on Quizplus for this Chatper
120 Verified Questions
120 Flashcards
Source URL: https://quizplus.com/quiz/38097
Sample Questions
Q1) The goto command is rarely used by skilled programmers because it can lead to programs that are difficult to understand and maintain.
A)True
B)False
Q2) The ________________ paradigm is based on the idea that the solution for a problem can be visualized in terms of objects that interact with each other.
A)declarative
B)object-oriented
C)procedural
D)none of the above
Q3) In a problem statement, a(n) ____________ is something you accept as correct in order to proceed with program planning.
Q4) In the context of a VDE, a(n) ___________ Â is a screen-based object whose behavior can be defined by a programmer.
Q5) In a problem statement, a(n) _____________ methodology requires extensive planning and documentation up front.
Q6) In a programming language, a(n) ______, or command, is a word with a predefined meaning
To view all questions and flashcards with answers, click on the resource link above. Page 13

Chapter 12: Step-By-Step Programming With Python
Available Study Resources on Quizplus for this Chatper
90 Verified Questions
90 Flashcards
Source URL: https://quizplus.com/quiz/38086
Sample Questions
Q1) A program containing a _____ error will run without displaying an error message, but it will not produce the expected result.
Q2) Which of the following words is a logical operator in Python?
A)NOT
B)OR
C)AND
D)all of the above
Q3) _______ programming is a style of programming that focuses on using objects to design and build applications.
Q4) A________ is a computer program that is used to find errors that may exist in a program.
Q5) The Python programming language was named after the TV show Monty Python's Flying Circus.
A)True
B)False
Q6) Python keywords, such as print and class, are not allowed as variable names.
A)True
B)False
Q7) In programming, an ______ is a symbol that represents an action.
To view all questions and flashcards with answers, click on the resource link above. Page 14